Skip to main content

AWS

Use CasesLacework Feature(s)Data Source
Cloud Security Posture Management (CSPM)
Cloud Infrastructure Entitilement Management (CIEM)
Compliance Dashboard and Reports
Cloud Infrastructure Entitilement Management Dashboard
Attack Path Analysis and Exposure Polygraph
AWS Cloud Configuration
User Entity Behaviour Analytics (UEBA)Cloud Anomaly Detection
Cloud Drift Detection
Cloud Audit Polygraph
AWS Cloud Audit Logs
Vulnerability ManagementVulnerability Management DashboardECR
AWS Agentless Workload Scanning
User Entity Behaviour Analytics (UEBA)Kubernetes Audit Log Dashboard
Kubernetes Anomaly Detection
Kubernetes Audit Log Polygraph
EKS Audit
Use CasesLacework Feature(s)Data Source
Cloud Security Posture Management (CSPM)
Cloud Infrastructure Entitilement Management (CIEM)
Compliance Dashboard and Reports
Cloud Infrastructure Entitilement Management Dashboard
Attack Path Analysis and Exposure Polygraph
AWS Cloud Configuration
User Entity Behaviour Analytics (UEBA)Cloud Anomaly Detection
Cloud Drift Detection
Cloud Audit Polygraph
AWS Cloud Audit Logs
Cloud Audit and Configuration 📎

Guided configuration is a wizard-like interface that takes your input and generates a script that downloads and sets up all necessary Lacework CLI and Terraform components to create the AWS integration non-interactively through AWS CloudShell. You can also choose to run the generated bundle from any host supported by Terraform.

Requirements

The final step of guided configuration is to run the generated bundle from either AWS CloudShell or any Terraform-supported host. Ensure your environment meets the corresponding requirements.

From AWS CloudShell

  • AWS Account Admin - The account used to run Terraform must have administrative privileges on every AWS account you intend to integrate with Lacework.
  • Lacework Administrator - A Lacework account with administrator privileges.

From Any Supported Host

  • AWS Account Admin - The account used to run Terraform must have administrative privileges on every AWS account you intend to integrate with Lacework.
  • AWS CLI - The Terraform provider for AWS leverages the configuration from the AWS CLI and it is recommended the AWS CLI is installed and configured with API keys for the account being integrated.
  • Linux Tools - The following Linux tools must be installed and present on PATH: curl, Git, and unzip.
  • Lacework Administrator - A Lacework account with administrator privileges.

Navigate to Guided Configuration

Follow these steps to integrate using guided configuration.

  1. Log in to the Lacework Console.
  2. Go to Settings > Integrations > Cloud accounts.
  3. Click + Add New.
  4. Click Amazon Web Services and select Guided configuration.
  5. Click Next.
  6. Select an integration type and follow the steps for the corresponding integration type.

Create a CloudTrail+Configuration Integration

Answer the questions about how to configure the integration.

Basic Configuration

  1. Do you want to enable Configuration integration?
    A Configuration integration analyzes your AWS environment's configuration compliance.
  2. Do you want to enable CloudTrail integration?
    A CloudTrail integration analyzes CloudTrail activity.
  3. Select the AWS region of your AWS accounts.
  4. Select an API key.
    • Select an existing API key from the list.
    • If no API keys exist, click Create New Key, provide a name and description, and click Save. Then select the key to use in the integration.

Advanced Configuration

For optional advanced configuration, click Advanced configuration (optional) and click Configure for the options you want to configure. The following options are available.

Additional CloudTrail options

  • Consolidate CloudTrail logs - Select to configure a consolidated CloudTrail.

    If you consolidate CloudTrails from multiple AWS accounts into one bucket, Lacework maps the account ID to the account alias for the root account only. Other account IDs are not mapped to account aliases.

  • Enable force destroy of the S3 bucket - Select to enable force destroy (required when bucket is not empty).
  • Enable SQS encryption - Select to enable server-side encryption on SQS.
  • Specify name of CloudTrail integration - A unique name for the integration that displays in the Lacework Console.
  • SQS queue name - Name of the SQS queue.
  • SQS encryption key ARN - ARN of the KMS encryption key to use for SQS.

CloudTrail bucket options

  • Use an existing CloudTrail bucket instead - Enable to use an existing bucket.
  • Bucket name - Name of the newly created bucket.
  • Enable bucket encryption - Select to enable encryption on the created bucket.
  • Bucket SSE key ARN - ARN of the KMS encryption key to use for the bucket.

CloudTrail SNS topic options

  • Use an existing SNS topic instead - Enable to use an existing topic.
  • SNS topic name - Name of the newly created topic.
  • Disable SNS topic encryption - Select to disable encryption on the SNS topic. Default behavior uses encryption.
  • SNS topic encryption key ARN - ARN of the KMS encryption key to use for SNS.

Add additional AWS accounts to Lacework

Specify the AWS profile and region. Add AWS accounts as needed.

Configure Lacework integration with an existing IAM role

  • Name - IAM role name. Must match IAM role ARN.
  • ARN - IAM role ARN.
  • External ID - Copy the Lacework-generated external ID. You must use this external ID to replace the current one. Refer to Update Cross-Account IAM Role External ID for how to update the cross-account role's external ID. [END]:#