Google Chronicle
Integrating Secoda logs with Google Chronicle SIEM
Introduction
This guide outlines the steps for customers to connect to Secoda's AWS CloudWatch Logs via Google Chronicle Security Information and Event Management (SIEM). Secoda manages a single-tenant instance on AWS, ensuring that each customer can securely access their designated CloudWatch logs for advanced monitoring and security analytics using Google Chronicle.
Prerequisites
Before initiating this process, ensure you have:
Access Credentials: Provided by Secoda for accessing the AWS environment.
Google Chronicle Account: Access with necessary permissions to configure data sources.
Secoda Support Contact: For any assistance required during the setup.
Steps to Connect Secoda's AWS CloudWatch Logs to Google Chronicle SIEM
Step 1: Obtain AWS Credentials from Secoda
Contact Secoda to obtain the necessary credentials and access configurations for the AWS environment where your logs are stored. Secoda will provide:
AWS Access Key ID and Secret Access Key: For programmatic access to AWS.
Specific CloudWatch Log Group Name: Identifying the log group that contains your logs.
Step 2: Configure Google Chronicle to Receive Logs
Set Up a New Data Source in Google Chronicle
Log into your Google Chronicle account.
Navigate to Settings and then to Sources.
Select Add Source to configure a new data source for receiving logs from AWS CloudWatch.
Chronicle will provide a URL endpoint; this will be used to configure the log export in AWS.
Step 3: Set Up CloudWatch Log Export to Google Chronicle
Configure Export Task in AWS
Utilize the AWS CLI with the credentials provided by Secoda to set up an export task that forwards logs to Google Chronicle.
Open your command line interface.
Configure the AWS CLI with the credentials provided by Secoda.
Execute the following command to create an export task:
Replace placeholders with the details specific to your configuration.
Monitor Export Task
It's important to ensure that the logs are being transferred correctly.
Step 4: Validate Log Reception in Google Chronicle
Verify Incoming Data
After setting up the data source and export task, monitor the Google Chronicle interface to confirm that logs are being ingested correctly. Check for any discrepancies and ensure the data matches the logs sent from AWS.
Troubleshooting Common Issues
Authentication and Permissions: If there are issues accessing AWS or exporting logs, please verify the credentials and permissions provided by Secoda.
Configuration Errors: Double-check all entered configurations for accuracy, especially the endpoint URLs and log group names.
Data Discrepancies: If logs do not appear as expected in Google Chronicle, contact Secoda support for assistance in verifying log configurations and export settings.
Conclusion
Connecting to Secoda's AWS CloudWatch Logs via Google Chronicle SIEM allows customers to utilize powerful security analytics and monitoring tools for enhanced visibility and security of their systems managed by Secoda. Should you encounter any difficulties during setup or operation, Secoda's support team is available to assist with resolving issues and ensuring a smooth integration process.
Last updated