- Environment: AWS
- Supported Guardium versions:
- Guardium Data Protection: 11.4 and later
- Supported inputs:
- S3 (pull)
- CloudWatch (pull)
- SQS (Pull)
- Supported inputs:
- Guardium Insights: 3.3
- Supported inputs:
- CloudWatch (pull)
- Supported inputs:
- Guardium Insights SaaS: 1.0
- Supported inputs:
- CloudWatch (pull)
- Supported inputs:
- Guardium Data Protection: 11.4 and later
This is a Logstash filter plug-in for the universal connector that is featured in IBM Security Guardium. It parses events and messages from the Amazon DynamoDB audit log into a Guardium record instance (which is a standard structure made out of several parts). The information is then sent over to Guardium. Guardium records include the accessor (the person who tried to access the data), the session, data, and exceptions. If there are no errors, the data contains details about the query "construct". The construct details the main action (verb) and collections (objects) involved.
The plug-in is free and open-source (Apache 2.0). It can be used as a starting point to develop additional filter plug-ins for Guardium universal connector.
In the AWS web interface, configure the service for Dynamodb.
- Go to https://console.aws.amazon.com/
- Click Services in the top left menu.
- Underneath All services, click on Database.
- On the right panel, click DynamoDB.
- At the top right, click on the dropdown menu and select your region.
- Click the orange Create Table button.
- Enter a table name.
- Enter a partition key.
- Scroll down and click the orange Create table button.
There are different methods for auditing and logging. We will use CloudTrail for this example since it supports all required parameters. The following events are supported for auditing in AWS.
- Click Services in the top left menu.
- Underneath All services, click on Management & Governance.
- On the right panel, click Cloud Trail.
- Click Create trail button.
- Provide a trail name under Trail name.
- Under Storage location, verify that Create new S3 bucket is selected.
- Under Log file SSE-KMS encryption, clear the Enabled box.
- If the logs are to be monitored through CloudWatch, then forward them to Cloudwatch using steps 9 to 13. (If not, skip those steps).
- Under CloudWatch Logs, check the Enabled box.
- Verify New is selected for Log group.
- Under Log group name, provide a new log group name.
- Verify New is selected for IAM Role.
- For Role name, provide a new role name.
- Click Next.
- For Event type, select Management events and Data events.
- Verify that Read and Write are selected for API Activity.
- In the Data Events section, click Switch to basic event selectors.
- Click Continue to confirm.
- Click Add data event type.
- Click Data event source and select DynamoDB.
- Click NEXT.
- Verify that all parameters shown are correct.
- Click Create trail.
- The Dynamo DB plug-in does not support IPV6.
- You may need to disable management events in order to avoid heavy traffic and data loss in Guardium. Disabling management events disables logging of the following events: CreateTable, DeleteTable, ListTable, UpdateTable, DescribeTable events.
- The following fields couldn't be mapped with the Dynamo audit logs,
- Client HostName : Not available with audit logs so set as NA.