Getting Started with Azure Sentinel (part 3 of 4)
Cloud Platform Integrations
Integrating with AWS
- AWS Cloud Trail logs have insights into AWS user activities, like failed sign-in attempts, IP addresses, regions, user agents, identity types as well as potential malicious user activities with assumed roles.
- AWS Cloud Trail logs have network related resource activities too, like the creation, update, and deletions of security groups, network Access Control Lists (ACLs) and routes, gateways, elastic load balancers, Virtual Private Cloud (VPC), subnets, and network interfaces.
Integrating with Google Cloud Platform (GCP)
- REST API- Currently this feature is under development, but once released, you will be able to create your own investigation queries.
- Deploy a CASB solution that can interact with GCP logs, control session access, and forward relevant information to Azure Sentinel.
- Deploy a log collector like Syslog, CEF, or LogStash and make sure that all the deployed resources can forward their logs through log collector to Azure Sentinel.
Integrating with Microsoft Azure
- Azure AD can accumulate insights about app usage, conditional access policies, legacy authentication, self-service password reset, and management of users, groups, roles as well as apps; to collect sign-in logs and audit.
- Azure AD Identity Protection can readily offer the capability of instant risk remediation to users and sign-in risk events as well as vulnerabilities.
- Azure ATP to secure Active Directory domains and forests.
- Azure Information Protection can classify and optionally protect sensitive information.
- Azure Security Center is a CWPP for Azure and hybrid deployments.
- DNS analytics can improve investigations for the clients who want to resolve malicious domain names, talkative DNS clients, and other DNS health-related events.
- Microsoft Cloud App Security will be getting visibility into connected cloud apps and analysis of firewall logs.
- Microsoft Defender ATP is an security platform designed to prevent, detect, investigate, and respond to advanced threats on Windows, Mac, and Linux computers.
- Microsoft Web App Firewall (WAF) can easily secure applications from common web vulnerabilities.
- Microsoft Office 365 offers a view into user's activities like file downloads, access requests, changes to group events, and mailbox activity.
- Microsoft Threat Intelligence Platform is used to integrate with the Microsoft Graph Security API data sources, can send threat indicators from Microsoft and third-party threat intelligence platforms.
- It is recommended to have Windows Firewalls on your servers and desktop computers.
It is strongly recommended to consider deploying CWPP solution to offer extra security against misconfiguration and compliance violations which can further send events to Azure Sentinel for central reporting, alerting as well as remediation.
Private Infrastructure Integration
The load can also be reduced by filtering the data of the configured data collectors while also maintaining the balance between volume and velocity of the collected data to ensure the sufficient availability of bandwidth so that data can be sent to Azure Sentinel easily.
Secondly, you can also integrate by just investigating and automating your actions to thoroughly understand and remediate all the issues where automation means the deployment of Azure Automation to run scripts, or through third-party solution integration, depending on the managed resources.
However, as soon as your private infrastructure looses internet connectivity, all of your systems will not be able to communicate with Azure Sentinel during the outage, hence you should also consider your investments in redundancy and fault tolerance.
Comments
Post a Comment