Onboarding an AWS Account with CDR
What is CDR?
Cloud Detection and Response (CDR) is a near real-time, event-driven suite of detections which generate findings in Plerion. These detections can be integrated with Plerion Workflows for user-configurable alerting.
How do you enable it?
To enable CDR you must ensure that you are logged in to a tenant which has an AWS Account integration.
Once logged-in, use the left-hand-side menu and navigate to Tenant Settings > Integrations > AWS Cloud Detection and Response and click the + icon in the upper right-hand-side of the tile.
From the list of integrated AWS accounts, select one or more accounts you wish to connect Plerion CDR to and click Add Integration(s).
After the Add Integration(s) step completes successfully, you will see a set of steps that will guide you through setting up CDR using CloudFormation StackSets in the AWS console for the following scenarios:
- Single account, multi-region
- Multi-account, multi-region
Please see Multi-Account, Multi-Region note below for more information.
Single Account, Multi-region Onboarding
Prior to creating the AWS CloudFormation StackSet following the instructions below, please ensure that following roles have been created as per the instructions here (opens in a new tab)
- AWSCloudFormationStackSetAdministrationRole
- AWSCloudFormationStackSetExecutionRole
Access StackSets in AWS Console
Sign in to the AWS Account you wish to deploy Cloud Detection and Response into using AWS Console Navigate to CloudFormation StackSets and click Create To learn more about Cloudformation StackSets visit this page (opens in a new tab)
Please note that apart from the S3 URL and the Parameters provided by Plerion, the rest of the config for the StackSet can be selected based on the user's preference. For deployment region in the next steps, you can select any regions where you would like to deploy Cloud Detection and Response. For more details on each of these configs, please refer to AWS official Getting Started with StackSets Guide.
Choose a Template
Permissions
- For IAM admin role ARN Select IAM role name and then select AWSCloudFormationStackSetAdministrationRole
- For IAM execution role name select AWSCloudFormationStackSetExecutionRole
- For Prerequisite - Prepare template - Select Template is ready
- For Specify template - Select Amazon S3 URL as the Template Source
- Paste in the S3 URL provided
you will be shown a pre-signed URL which you can copy and paste into the AWS console
Specify StackSet details
- Enter the StackSet Name provided and optionally the StackSet Description
Configure StackSet options
- Optionally set Tags for the StackSet
- Selecting either one of Inactive or Active here would work successfully. Active is chosen so that StackSets performs non-conflicting operations concurrently and queues conflicting operations
Set deployment options
- For Add stacks to stack set - Select Deploy new stacks
- For Accounts - Select Deploy stacks in accounts and enter the Account ID for the currently selected account
- For Specify regions, select each region you wish to deploy Cloud Detection and Response into
- (Optional) For Deployment options,
- Select Maximum concurrent accounts as 1
- Select Failure tolerance - optional as 0
- Region Concurrency as Parallel
Review
- Review the configuration
- Check the box - I acknowledge that AWS CloudFormation might create IAM resources.
- Click Submit
Stacks will be created in the AWS regions selected
Once the stacks have completed successfully, the created resources will begin to send events to Plerion for monitoring
Multi-Account, Multi-Region
Currently, Plerion CDR does not support multi-account onboarding for integrations that include your AWS management account. Please contact support@plerion.com if you wish to onboard your AWS management account to Plerion CDR.
Choose a template
- Navigate to CloudFormation - StackSets - Create StackSet
- For Permissions select Service Managed Permissions
- Prerequisite - Prepare Template select Template is ready
- For Specify template - Template source select Amazon S3 URL and copy & paste the Amazon S3 URL provided
- Click Next
Specify StackSet Details
- Enter the StackSet name provided.
- Optionally add a StackSet Description
- Click Next
Configure StackSet options
- Optionally Add Tags to StackSet resources
- For Execution configuration selecting either one of Inactive or Active would work successfully. Active is chosen so that StackSets performs non-conflicting operations concurrently and queues conflicting operations.
- Click Next
Set deployment options
- Select Deploy new stacks
- For Deployment targets select Deploy to organizational units (OUs)
- In the AWS OU ID field, enter the name of an OU which contains all the accounts you wish to integrate. Note: this may require selection of multiple OUs or the Root OU.
- For Account filter type - optional select Intersection
- Copy and paste the Account numbers from the box provided
- For Auto-deployment options set Automatic deployment to Deactivated
- Specify regions that you would like to deploy CDR into
- Optionally specify Deployment options
- Select Next
Review
- Finally, review the StackSet configuration and check the Capabilities acknowledgment and click Submit
How do you configure Workflows to use CDR?
CDR detection behave in the same way as other detections within Plerion. When a detections rules are met, CDR will generate a finding in the Finding Dashboard. This means that all CDR findings can have workflow actions configured for them. To configure a workflow action:
- Use the left-hand-side navigation to go to: Tenant Settings > Workflows. From here you may decide to either create a new workflow or modify an existing one.
- From the workflow form, complete the following:
- Name
- Description
- Enabled
- Condition > Add Finding Condition - as mentioned above, CDR generates a finding therefore this option much be selected. Each of the CDR findings can be identified by their detection ID which will follow the format PLERION-CLOUDTRAIL-[detection number here]. Select one or more detections.
- Actions - select the action you wish to perform when CDR generates a finding. By default, an Alert will be generated on the Plerion alerts dashboard.
What do you do if you get an Alert/Finding?
Findings and Alerts generated by CDR are not expired/removed from Plerion dashboards by default. Each of the findings must be suppressed manually by a user. To perform this action:
Navigate to the Findings Dashboard and in the Detection filter type PLERION-CLOUDTRAIL- and select all detections you wish to suppress.
Select each finding and on the contextual view window select Suppress. This action will dismiss the finding and any corresponding alerts.
If you wish to see previously suppressed findings you may select the Suppressed filter and set the value to True
List of detections
PLERION-CLOUDTRAIL-3 - Detect a successful login to the AWS Management Console by the Root user
PLERION-CLOUDTRAIL-5 - Detect a successful AWS console login
PLERION-CLOUDTRAIL-7 - Detect an AWS Config rule deletion
PLERION-CLOUDTRAIL-8 - Detect an AWS Config change to stop recording
PLERION-CLOUDTRAIL-9 - Detect the deletion of an AWS CloudTrail trail
PLERION-CLOUDTRAIL-10 - Detect suspending the recording of AWS API calls and log file delivery
PLERION-CLOUDTRAIL-12 - Detect an update to an AWS CloudTrail setting that specifies the delivery of log files
PLERION-CLOUDTRAIL-15 - Detect an unauthorized AWS API call
PLERION-CLOUDTRAIL-25 - Detect the deletion of an Amazon GuardDuty detector
PLERION-CLOUDTRAIL-32 - Detect the deletion of flow logs
PLERION-CLOUDTRAIL-33 - Detect the deletion of a Web Application Firewall v2 (WAFv2) access control list
PLERION-CLOUDTRAIL-34 - Detect the deletion of a Web Application Firewall v2 (WAFv2) rule or rule group
PLERION-CLOUDTRAIL-59 - Detect the deletion of a Web Application Firewall v1 (WAFv1) access control list
PLERION-CLOUDTRAIL-60 - Detect the deletion of a Web Application Firewall v1 (WAFv1) rule or rule group
PLERION-CLOUDTRAIL-61 - Detect the detaching of a WAF from CloudFront
PLERION-CLOUDTRAIL-62 - Detect the detaching of a WAF from API Gateway
PLERION-CLOUDTRAIL-63 - Detect the detaching of a WAF from ALB
PLERION-GUARDDUTY-1 - Amazon GuardDuty Finding Created
PLERION-MACIE-1 - Amazon Macie Finding Created
PLERION-ACCESSANALYZER-1 - AWS IAM Access Analyzer Finding Created
PLERION-CLOUDTRAIL-68 - Detect attempts to remove event selectors in CloudTrail
PLERION-CLOUDTRAIL-70 - Detect attempts to leave the AWS Organization
PLERION-CLOUDTRAIL-71 - Detect attempts to update user data of an EC2 instance
PLERION-CLOUDTRAIL-72 - Detect attempts to exfiltrate AMI by sharing it
PLERION-CLOUDTRAIL-73 - Detect attempts to exfiltrate EBS snapshot by sharing it
PLERION-CLOUDTRAIL-74 - Detect attempts to exfiltrate RDS snapshot by sharing it
PLERION-CLOUDTRAIL-75 - Detect attempts to change MFA settings for an IAM User
PLERION-CLOUDTRAIL-76 - Detect the creation of new IAM user access keys
PLERION-CLOUDTRAIL-77 - Detect attempts to disable Amazon Macie
PLERION-CLOUDTRAIL-78 - Detect attempts to delete IAM Access Analyzer
PLERION-CLOUDTRAIL-79 - Detect attempts to export an EC2 instance
PLERION-CLOUDTRAIL-80 - Detect attempts to export an RDS Aurora database snapshot
PLERION-CLOUDTRAIL-81 - Detect attempts to remove transfer lock from a Route 53 domain
PLERION-CLOUDTRAIL-82 - Detect attempts to transfer a Route 53 domain to another account
PLERION-CLOUDTRAIL-83 - Detect IAM password recovery requests
How do you disable CDR?
To remove CDR completely, follow these three steps:
Remove conditions from Workflow - If there are workflows created which run on the creation of a CDR finding, select them from the workflows list and select Delete to remove them.
Delete integration - navigate to Tenant Settings > Integrations and select the X active integration(s) option at the bottom of the tile. Select the CDR integration you wish to remove and in the upper right-hand corner of the integration page click the trash can icon to remove the integration.
Delete the CloudFormation stack - In the AWS Account you had connected to Plerion, navigate to CloudFormation and search for cdr. Locate the Plerion CDR CloudFormation stack for the list, click the radio button and click Delete button from the top-right of the page.
CDR Data Lifecycle
The lifecycle of data generated by a CDR integration is automatically managed, ensuring only the most timely information is retained and stale data is removed. The following lifecycle rules are currently in effect:
- Findings: All findings generated by a CDR integration (PLERION-CLOUDTRAIL-X) are permanently deleted when their First Observed date equals or exceeds 90 Days.
- Event History: Events displayed in the Principal History contextual view tab of a CDR-generated finding are permanently deleted when the age of the event exceeds 90 Days.