Links

S3 Source

Onboarding AWS S3 as a Data Transport log source in the Panther Console

Overview

Follow the steps below to enable secure access for Panther to pull security logs from Amazon Web Services (AWS) S3 bucket(s). First you will configure the S3 source in your Panther Console, then you will configure your S3 bucket to send notifications when it receives new data.
See the diagram below to understand how data flows from your application(s) into Panther using S3.
A diagram shows how data flows from a customer application into Panther, using the S3 bucket Data Transport. The flow is as follows: Application(s), S3 bucket, SNS topic, SQS, Panther application, IAM role (assumed by Panther), KMS key (optional), S3 bucket, Panther application, Parse & normalize, real-time detections, Alerts generated, Long-term retention in Snowflake, and Alert Destinations

How to pull logs from AWS S3 buckets into Panther

Configure the Source in Panther

  1. 1.
    Log in to your Panther Console.
  2. 2.
    In the left sidebar menu click Configure > Log Sources.
  3. 3.
    In the upper right corner, click Create New.
  4. 4.
    Click the Custom Log Formats tile.
  5. 5.
    Click AWS S3 Bucket.
  6. 6.
    Enter the Bucket details:
    • Name: Enter a memorable name for the S3 source.
    • Account ID: Enter the 12-digit AWS Account ID where the S3 buckets are located.
    • Bucket Name: Enter the S3 Bucket ID/name to onboard.
    • KMS Key (optional): If your data is encrypted using KMS-SSE, provide the ARN of the KMS key.
    • Stream Type:
      • Choose one of the following log formats (view examples for each type here):
        • Lines: Events are separated by a new line character.
        • JSON: Events are in JSON format.
        • JSON Array: Events are inside an array of JSON objects.
        • CloudWatch Logs: Events came from CloudWatch Logs.
      • If an incorrect stream type is chosen, Panther will trigger a system error alert.
      • For instructions on sending CloudWatch Logs to S3 via Kinesis Data Firehose, please see the AWS documentation: Subscription filters with Amazon Kinesis Data Firehose.
    • Select S3 Prefix Filters:
      • S3 Prefix Filter: Define a prefix to tell Panther which folders to include in the event that your S3 bucket contains multiple data sources. Leave this field blank if you want to allow ingestion of all files.
      • S3 Exclusion Filter: Define a prefix to tell Panther which folder paths to exclude. You can use the * character as a wildcard for Exclusion Filters to capture a group of prefixes, such as exampleID/AWSLogs/*/CloudTrail/*.
    • Log Types: The Log Types Panther should use to parse objects within the S3 bucket.
  7. 7.
    Click Continue Setup.
If you set up an S3 log source without a KMS key, you must recreate the log source to include the key.
​

Setup an IAM role

The "Setup an IAM role" page is displayed, where you can click Select next to "Using the AWS Console UI" or next to "CloudFormation or Terraform Template File," or you can click the link that says "I want to set up everything on my own."
Panther needs an AWS IAM role with permissions to read objects from your S3 bucket. You can choose from the following options:

Using the AWS Console UI

Launch a CloudFormation stack using the AWS console:
  1. 1.
    On the "Setup an IAM role" page, locate the tile labeled "Using the AWS Console UI". On the right side of the tile, click Select.
  2. 2.
    Click Launch Console UI.
    The image above shows a screen from the Panther Console after you choose the option "Using the AWS Console UI."
    ​
    • You will be redirected to the AWS console in a new browser tab, with the template URL pre-filled.
    • The CloudFormation stack will create an AWS IAM role with the minimum required permissions to read objects from your S3 bucket.
    • Click the "Outputs" tab of the CloudFormation stack in AWS, and note the Role ARN.
  3. 3.
    Navigate back to your Panther account.
  4. 4.
    On the "Use AWS UI to set up your role" page, enter the Role ARN.
  5. 5.
    Click Finish Setup.
  6. 6.
    Proceed to the Finish the Source Setup section in this documentation.

CloudFormation or Terraform Template File

Use Panther's provided CloudFormation or Terraform templates to create an IAM role by choosing Select to the right of this option.
  1. 1.
    On the "Set Up an IAM role" page, choose to download the CloudFormation Template or Terraform Template File and click Select.
  2. 2.
    On the "CloudFormation or Terraform Template File" page, choose which type of template you would like to download.
  3. 3.
    If selecting CloudFormation:
    1. 1.
      Click CloudFormation Template, which downloads the template to apply it through your own pipeline.
    2. 2.
      Upload the template file in AWS:
      1. 1.
        Open your AWS console and navigate to the CloudFormation service.
      2. 2.
        Click Create stack.
      3. 3.
        Click Upload a template file and select the CloudFormation template you downloaded.
  4. 4.
    If selecting Terraform Template:
    1. 1.
      Click Terraform Template, which downloads the template to apply it through your own pipeline.
  5. 5.
    On the "CloudFormation or Terraform Template File" page in Panther, enter the Role ARN.
  6. 6.
    Click Finish Setup.
  7. 7.
    Proceed to the Finish the Source Setup section in this documentation.

I want to set everything up on my own

Create the role yourself and fill in the role ARN in Panther. When you set up the IAM role manually, you must also follow the instructions below to configure your S3 buckets to send notifications when new data arrives.
  1. 1.
    On the "Set Up an IAM role" page, click the link that says I want to set everything up on my own.
  2. 2.
    Create the required IAM role. You may create the required IAM role manually or through your own automation.
    • The IAM policy, which will be attached to the role, must include the statements defined below:
      {
      "Version": "2012-10-17",
      "Statement": [
      {
      "Action": "s3:GetBucketLocation",
      "Resource": "arn:aws:s3:::<bucket-name>",
      "Effect": "Allow"
      },
      {
      "Action": "s3:GetObject",
      "Resource": "arn:aws:s3:::<bucket-name>/<input-file-path>",
      "Effect": "Allow"
      }
      ]
      }
    • If your S3 bucket is configured with server-side encryption using AWS KMS, you must include an additional statement granting the Panther API access to the corresponding KMS key. In this case, the policy will look something like this:
      {
      "Version": "2012-10-17",
      "Statement": [
      {
      "Action": "s3:GetBucketLocation",
      "Resource": "arn:aws:s3:::<bucket-name>",
      "Effect": "Allow"
      },
      {
      "Action": "s3:GetObject",
      "Resource": "arn:aws:s3:::<bucket-name>/<input-file-path>",
      "Effect": "Allow"
      },
      {
      "Action": ["kms:Decrypt", "kms:DescribeKey"],
      "Resource": "arn:aws:kms:<region>:<your-account-id>:key/<kms-key-id>",
      "Effect": "Allow"
      }
      ]
      }
  3. 3.
    Add a trust policy to your role with the following AssumeRolePolicyDocument statement so that Panther can assume this role:
    {
    "Version": "2012-10-17",
    "Statement": [
    {
    "Effect": "Allow",
    "Principal": {
    "AWS": [
    "arn:<aws-partition>:iam::<panther-master-account-id>:root"
    ]
    },
    "Action": "sts:AssumeRole",
    "Condition": {
    "Bool": {
    "aws:SecureTransport": true
    }
    }
    }
    ]
    }
    ​
    • Populate <AWS-PARTITION> with the partition of the account running the Panther backend (e.g., aws). Note that we do not deploy to aws-cn or aws-us-gov.
    • Populate <PANTHER-MASTER-ACCOUNT-ID> with the 12-digit account ID where Panther is deployed. To get your AWS Account ID: Click the gear icon in the upper right side of the Panther Console to access Settings, then the AWS account ID is displayed at the bottom of the page.
  4. 4.
    On the "Setting up role manually" page in the Panther Console, enter the Role ARN.
  5. 5.
    Click Finish Setup.

Finish the source setup

Note: If you choose the option I want to set everything up on my own to create an IAM role, you must also configure the S3 buckets to send notifications when new data arrives.
After you configure the IAM role in your AWS console, you will see a success screen:
A screen in the Panther Console displays the message "Everything looks good!"
​
To finish the source setup:
  1. 1.
    Optionally configure a log drop-off alarm.
    • Before you finish the setup, we recommend that you create a log drop-off alarm to alert you if data stops flowing from the log source. Be sure to set an appropriate time interval for when you would like Panther to alert you that the log source is not sending data.
      ​
  2. 2.
    Optionally enable a Detection Pack.
  3. 3.
    Click Finish Setup.
If any permission errors are detected, they will be displayed on this screen and you will be asked to try configuring the IAM role again.

Viewing Collected Logs

After log sources are configured, your data can be searched in Data Explorer. Learn more in the Data Explorer documentation.

Data Backup

Once the S3 bucket has been successfully onboarded to Panther and data is flowing, Panther will backup all raw logs for up to 90 days. After that, the logs will be deleted.
The raw logs are used for various reasons, for example: To backup dropped logs that may not have been successfully normalized and classified in Panther's data processing pipeline.

Manual IAM role creation: Additional steps

When you set up the IAM role manually, you must also follow the instructions below to configure your S3 buckets to send notifications when new data arrives.

Create SNS Topic

Note: If you already have configured the bucket to send All object create events to an SNS topic, proceed to the next section, "Modify an existing SNS topic," and subscribe it to Panther's input data queue.
Only one SNS topic is required per AWS account, so multiple buckets within one AWS account all use the same SNS topic for Panther. If you've already created an SNS topic for a different S3 bucket in the same AWS account, you can skip this step of creating an SNS topic.
First you need to create an SNS Topic and SNS Subscription to notify Panther that new data is ready for processing.
  1. 1.
    Log into the AWS Console of the account that owns the S3 bucket.
  2. 2.
    Select the AWS Region where your S3 bucket is located and navigate to the CloudFormation console.
  3. 3.
    Navigate to the Stacks section. Select Create Stack (with new resources).
    In the AWS CloudFormation console, there is a "Create Stack" dropdown menu in the upper right. In this image, the menu is expanded and the option "with new resources (standard)" is highlighted.
    ​
  4. 4.
    Under the "Specify template" section, enter the following Amazon S3 URL:
    https://panther-public-cloudformation-templates.s3-us-west-2.amazonaws.com/panther-log-processing-notifications/latest/template.yml
    On the Create Stack page in the AWS CloudFormation console, there is a section at the top labeled "Prerequisite - Prepare template." The option "Template is ready" is selected. In the "Specify Template" section, the template source "Amazon S3 URL" is selected and a URL is pasted into the template URL field.
  5. 5.
    Specify the following stack details:
    • Stack name: A name of your choice, e.g. panther-log-processing-notifications-<bucket-label>
    • MasterAccountId: The 12 digit AWS Account ID where Panther is deployed
    • PantherRegion: The region where Panther is deployed
    • SnsTopicName: The name of the SNS topic receiving the notification, by default this is panther-notifications-topic
  6. 6.
    Click Next, Next, and then Create Stack to complete the process.
Note: This stack has one output named SnsTopicArn.
​

Modify an existing SNS topic

If you opted to create a new SNS topic in the previous step, skip this step and proceed to the section below, "Configure Event Notifications on the bucket."
Follow the steps below if you wish to use an existing topic for sending bucket notifications. Note that the SNS topic must be in the same region as your S3 bucket.

Setup Encryption

We recommend enabling KMS encryption for the SNS topic:
  1. 1.
    Log in to the AWS console and navigate to KMS.
  2. 2.
    Select the KMS key you want to use for encryption.
  3. 3.
    Edit the policy to ensure it has the appropriate permissions to be used with S3 bucket notifications.
  4. 4.
    Click the Encryption tab under the SNS topic.
  5. 5.
    Click Enable, and specify the KMS key you want to use for encryption.

Modify SNS Access Policy

Create a subscription between your SNS topic and Panther's log processing SQS queue.
  1. 1.
    Log into the AWS Console for the account where your S3 bucket exists
  2. 2.
    Navigate to the SNS Console and select the SNS Topic currently receiving events
  3. 3.
    Note the ARN of this SNS topic
  4. 4.
    Click Edit and scroll down to the "Access Policy" card
  5. 5.
    Add the following statement to the topic's Access Policy:
    {
    "Sid": "CrossAccountSubscription",
    "Effect": "Allow",
    "Principal": {
    "AWS": "arn:aws:iam::<PANTHER-MASTER-ACCOUNT-ID>:root"
    },
    "Action": "sns:Subscribe",
    "Resource": "<SNS-TOPIC-ARN>"
    }
    • Populate <PANTHER-MASTER-ACCOUNT-ID> with the 12-digit account ID where Panther is deployed. This AWS account ID can be found in your Panther Console at the bottom of the page after navigating to Settings by clicking the gear icon.
    • Populate SNS-TOPIC-ARN with the ARN you noted previously in this documentation.

Create SNS Subscription

Create the subscription to the Panther Master account's SQS queue.
From the SNS Console, click Create subscription:
  1. 1.
    Fill out the form:
    • Protocol: Amazon SQS
    • Endpoint: arn:aws:sqs:<PantherRegion>:<MasterAccountId>:panther-input-data-notifications-queue
  2. 2.
    Do not check the box for the Enable raw message delivery setting; raw message delivery must be disabled.
  3. 3.
    Click Create subscription.
Note: If your subscription is in a "Pending" state and does not get confirmed immediately, you must finish setting up this log source in your Panther Console. Panther confirms the SNS subscription only if a Panther log source exists for the AWS account of the SNS topic.

Configure Event Notifications on the bucket

With the SNS Topic created, the final step is to enable notifications from the S3 buckets.
  1. 1.
    Navigate to the AWS S3 Console, select the relevant bucket, and click the Properties tab.
  2. 2.
    Locate the Event Notifications card.
  3. 3.
    Click + Create event notification and use the following settings:
    • In the "General Configuration" section:
      • Name: PantherEventNotifications
      • Suffix: (optional) limits notifications to objects with keys that end in matching characters
      • Prefix: (optional) limits notifications to objects with keys that start with matching characters
    • In the "Event Types" card, check the box next to All object create events.
    • In the "Destination" card:
      • Under "Destination," select SNS Topic.
      • For SNS Topic, select panther-notifications-topic from the drop-down menu.
      ​
      In the Destination card in the AWS S3 Console, the destination "SNS topic" is selected. Under "Specify SNS topic," the option "Choose from your SNS topics" is selected. The "SNS topic" drop-down menu is set to "panther-notifications-topic."
      ​
  4. 4.
    Click Save.
Panther will now start processing new files arriving to your bucket.