Skip to content

Commit

Permalink
Merge pull request #25 from awslabs/1.3.2
Browse files Browse the repository at this point in the history
1.3.2
  • Loading branch information
hackersifu authored Aug 4, 2021
2 parents 8b2733d + 6674bb1 commit 90d8095
Show file tree
Hide file tree
Showing 2 changed files with 18 additions and 13 deletions.
9 changes: 8 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -124,4 +124,11 @@
* Link for the AWS Security Analytics Bootstrap within the README.

### Changed
* Feedback section within README to contain link to Issues section.
* Feedback section within README to contain link to Issues section.

## [1.3.2] - 2021-08-03

### Changed
* README Documentation
* Removed unzip steps from single and multi-account instructions.
* Minor updates to various service names.
22 changes: 10 additions & 12 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,10 @@
Assisted Log Enabler for AWS is for customers who do not have logging turned on for various services, and lack knowledge of best practices and/or how to turn them on.

With Assisted Log Enabler for AWS, logging is turned on automatically for the various AWS Services for a customer:
* Amazon VPC Flow Logs (Single Account and Multi-Account using Organizations)
* Amazon VPC Flow Logs (Single Account and Multi-Account using AWS Organizations)
* AWS CloudTrail (Single Account Only)
* Amazon Elastic Kubernetes Service (EKS) Audit and Authenticator Logs (Single Account and Multi-Account using Organizations)
* Amazon Route 53 Resolver Query Logs (Single Account and Multi-Account using Organizations)
* Amazon Elastic Kubernetes Service (EKS) Audit and Authenticator Logs (Single Account and Multi-Account using AWS Organizations)
* Amazon Route 53 Resolver Query Logs (Single Account and Multi-Account using AWS Organizations)

Link to related AWS Open Source Blog Post: [Introducing Assisted Log Enabler for AWS](https://aws.amazon.com/blogs/opensource/introducing-assisted-log-enabler-for-aws/)

Expand Down Expand Up @@ -177,14 +177,13 @@ Service Options:
* Ensure that the principal being used to log into the AWS Console has the permissions [above](https://github.com/awslabs/assisted-log-enabler-for-aws#permissions).
2. Click on the icon for AWS Cloudshell next to the search bar.
* Ensure that you're in a region where AWS CloudShell is currently available.
3. Once the session begins, download the Assisted Log Enabler within the AWS CloudShell session.
3. Once the session begins, download the Assisted Log Enabler for AWS within the AWS CloudShell session.
```
git clone https://github.com/awslabs/assisted-log-enabler-for-aws.git
```
4. Unzip the file, and change the directory to the unzipped folder:
4. Change the directory to the folder cloned from the link in Step 3:
```
unzip assisted-log-enabler-for-aws-main.zip
cd assisted-log-enabler-for-aws-main
cd assisted-log-enabler-for-aws
```
5. Run the following command to run the Assisted Log Enabler in single account mode, for the AWS service or services you want to check for:
```
Expand Down Expand Up @@ -237,14 +236,13 @@ python3 assisted_log_enabler.py --mode single_account --cloudtrail
* Once this is submitted, you'll need to wait until the StackSet is fully deployed. If there are errors, please examine the error and ensure that all the information from the above steps are correct.
20. Once both the StackSet and Stack are successfully deployed, click on the icon for AWS Cloudshell next to the search bar.
* Ensure that you're in a region where AWS CloudShell is currently available.
21. Once the session begins, download the Assisted Log Enabler within the AWS CloudShell session.
21. Once the session begins, download the Assisted Log Enabler for AWS within the AWS CloudShell session.
```
git clone https://github.com/awslabs/assisted-log-enabler-for-aws.git
```
22. Unzip the file, and change the directory to the unzipped folder:
22. Change the directory to the folder cloned from the link in Step 21:
```
unzip assisted-log-enabler-for-aws-main.zip
cd assisted-log-enabler-for-aws-main
cd assisted-log-enabler-for-aws
```
23. Run the following command to run the Assisted Log Enabler in multi account mode, for the AWS service or services you want to check for:
```
Expand Down Expand Up @@ -294,7 +292,7 @@ python3 assisted_log_enabler.py --mode cleanup --single_r53querylogs
```

## Additional Tools
For analysing logs created by Assisted Log Enabler for AWS, consider taking a look at the AWS Security Analytics Bootstrap, a tool that provides an Amazon Athena analysis environment that's quick to deploy, ready to use, and easy to maintain. [Link](https://github.com/awslabs/aws-security-analytics-bootstrap)
For analyzing logs created by Assisted Log Enabler for AWS, consider taking a look at the AWS Security Analytics Bootstrap, a tool that provides an Amazon Athena analysis environment that's quick to deploy, ready to use, and easy to maintain. [Link](https://github.com/awslabs/aws-security-analytics-bootstrap)


## Costs
Expand Down

0 comments on commit 90d8095

Please sign in to comment.