...
An analyst wants to detect unauthorized access behavior in isolated virtual networks within AWS. Using the VPC SQS collector to send Flow logs to Devo, the analyst will find any unauthorized IP traffic. As a result, the analyst will block the intruder, preventing them from disrupting private network services.
...
Authorize SQS Data Access.
Select the VPC.
Create flow log.
Name the Flow “Devo.”
Devo recommends
Filter All
so that wrongly rejected and wrongly accepted traffic can be analyzed.Select
Send to an Amazon S3 bucket
.Use the ARN of the S3 bucket you created during the authorization process.
Keeping the defaults for the other settings, create the flow.
...