Purpose
An analyst wants to detect <adjective> behavior in <data source>. Using the <name> SQS collector to send <type> to Devo, the analyst will find <outcome>. As a result, the analyst will <verb> the <entity>, preventing them from <tactic>.
Example tables
Table | Description |
---|---|
cloud.aws.cloudfront.web_1 |
Authorize It
Authorize SQS Data Access.
Add data to the S3 bucket.
Update or create a CloudFront Distribution.
Turn log delivery on.
Enable cookie logging so that cookie poisoning attacks can be investigated.
Select Amazon S3 as the delivery method.
Enter the destination bucket created in Step 1.
Devo requires that the default 33 fields be selected.
Devo does not require partitioning.
Select “Plain text” format.
Select “\t” field delimiters.
Run It
In the Cloud Collector App, create an SQS Collector instance using this parameters template, replacing the values enclosed in < >
.
{ "inputs": { "sqs_collector": { "id": "<FIVE_UNIQUE_DIGITS>", "services": { "aws_sqs_control_tower": {} }, "credentials": { "aws_cross_account_role": "arn:<PARTITION>:iam::<YOUR_AWS_ACCOUNT_NUMBER>:role/<YOUR_ROLE>", "aws_external_id": "<EXTERNAL_ID>" }, "region": "<REGION>", "base_url": "https://sqs.<REGION>.amazonaws.com/<YOUR_AWS_ACCOUNT_NUMBER>/<QUEUE_NAME>" } } }
Secure It
Monitor It
Create an inactivity alert to detect interruptions of transfer of data from the source to the SQS queue using the query
from cloud.aws.cloudfront.web_1 where toktains(hostchain,"collector-") select split(hostchain,"-",1) as collector_id
Set the inactivity alert to keep track of the collector_id
.