LogRhythm Setup with AWS

Hari Kiran Vusirikala
2 min readApr 1, 2023

--

Architecture:

Procedure:

Step 1:

Create S3 bucket in Security-IRM.

Set following bucket policy to allow CloudTrail to check the bucket ACLs and put objects in specific S3 paths:

Create a lifecycle configuration rule to have 1 day retention.

Step 2:

Create SNS in Master Account.

Append the following Access policy to allow CloudTrail to publish content to SNS topic and allow Secuirty-IRM to subscribe to this SNS topic:

Step 3:

Create SQS in Security-IRM and subscribe to the above SNS topic ARN.

Step 4:

Create a KMS in Master account.

Append the following key policy statements for allowing CloudTrail to generate KMS date keys for encryption of logs being placed in S3 bucket and for Security-IRM users to decrypt with the KMS key:

Step 5:

Create organization trail in Master account with above Security IRM S3, KMS key ARN, SNS topic ARN.

Step 6:

Create IAM User in Security-IRM with permissions of S3 and SQS Read Only Access and note down the Access key and Secret access key.

Step 7:

Update LogRhythm with following details:

  1. IAM User Access key
  2. IAM User Secret access key
  3. S3 bucket logs path
  4. SQS ARN

--

--

Hari Kiran Vusirikala
Hari Kiran Vusirikala

Written by Hari Kiran Vusirikala

Full Stack Developer at Infosys | 4x AWS Certified

No responses yet