cisagov / crossfeed

External monitoring for organization assets
https://docs.crossfeed.cyber.dhs.gov
Creative Commons Zero v1.0 Universal
371 stars 54 forks source link

AU-05 - Audit Process - Migrate logs to S3 buckets #2118

Open stewartl97 opened 1 year ago

stewartl97 commented 1 year ago

💡 Summary

As a system architect, I need to ensure that log data is stored in a secure location approved for ATO validation

Motivation and context

Migrate log deliveries from Cloudtrail / Cloudwatch to the DHS required S3 bucket

Acceptance criteria

epicfaace commented 1 year ago

Cloudwatch and Cloudtrail

epicfaace commented 1 year ago

@Matthew-Grayson / @colin-tim can you please also revert the changes in https://github.com/cisagov/crossfeed/compare/d72c02c041cd9aea7a0c561a3997ce65a0c46044...master? Then we can start afresh with PRs for this task.

Matthew-Grayson commented 1 year ago

In Crossfeed commercial, CloudTrail logging of data events is now actively managed by Terraform. This includes CloudWatch log delivery and storage in a dedicated CloudTrail S3 bucket. We still need to implement the delivery of other CloudWatch logs to their respective buckets. And all tasks still need to be implemented in Crossfeed gov cloud.

aloftus23 commented 1 year ago

@epicfaace We're seeing there's no built-in way to extract cloudwatch logs into an s3 bucket.

Does this link to create a lambda function for it make sense? https://medium.com/dnx-labs/exporting-cloudwatch-logs-automatically-to-s3-with-a-lambda-function-80e1f7ea0187

Matthew-Grayson commented 1 year ago

On the commercial side, CloudWatch log groups are now backed up to S3 daily using a Lambda called cloudwatchToS3.