Skip to main content

Workload Visibility and Security

Provides workload level data collection visibility, enabling the resultant Lacework Feature(s):

Use CasesLacework Feature(s)Data Source
User and Entity Behavior Analytics (UEBA)Workload Anomaly Detection
Process Dashboard and Polygraph
Network Dashboard and Polygraph
Filesystem Dashboard and Polygraph
Linux Agent
Windows Agent
Kubernetes Agent
Vulnerability ManagementVulnerability Management Dashboard (including Active Vulnerability Detection)Linux Agent
Kubernetes Agent
Kubernetes Admission Contoller
Kubernetes Posture Management (KSPM)Kubernetes Compliance Dashboard and ReportsEKS Compliance

Below we'll review the requirements for deploying the Lacework agent to these various systems.

Use CasesLacework Feature(s)Data Source
User and Entity Behavior Analytics (UEBA)Workload Anomaly Detection
Process Dashboard and Polygraph
Network Dashboard and Polygraph
Filesystem Dashboard and Polygraph
Linux Agent
Vulnerability ManagementVulnerability Management Dashboard (including Active Vulnerability Detection)Linux Agent
Agent Supported Linux Operating Systems πŸ“Ž

To analyze application, host, and user behavior, Lacework uses a lightweight agent, which securely forwards collected metadata to the Lacework cloud for analysis. The agent requires minimal system resources and runs on most 64-bit Linux distributions such as the following:

x86 Architecture​

Operating SystemVersions
AlmaLinux8.7, 9.1
Note: Package vulnerability scanning is not supported on AlmaLinux OS.
Alpine Linux (General beta support)3.10, 3.11, 3.12, 3.13, 3.14, 3.15, 3.16.2
Amazon Linux2, 2022, 2023
Amazon Linux AMI2016.03, 2016.09, 2017.03, 2017.09, 2018.03
CBL-Mariner2.0
CentOS6.x, 7.x, 8.x, 9.x
Container-Optimized OS from Google81, 85, 89, 90, 93, 97, 101
Note: Package vulnerability scanning is not supported on Container-Optimized OS.
Debian9, 10, 11, 12
Fedora30, 31, 32, 33, 34, 35
Flatcar2605.x (amd64 only)
Kali GNU/Linux RollingRolling distribution (up to Kali 2022.3)
Oracle Linux8.3, 8.4, 8.5
Red Hat Enterprise Linux7.9, 8.0, 8.1.0, 8.2, 8.3, 8.4, 8.5, 8.6, 8.7, 8.8, 9
Red Hat OpenShift4.9
Red Hat OpenShift Service on AWS4.9, 4.10, 4.11, 4.12
Rocky Linux8.4, 8.5, 8.6, 8.7, 9.0, 9.1
SUSE11.4.20, 12 SP1, 12 SP5, 15, 15 SP1, 15 SP2, 15 SP3, 15 SP4
Ubuntu14.04, 16.04, 16.10, 17.04, 17.10, 18.04, 18.10, 19.04, 19.10, 20.04, 21.04, 21.10, 22.04 LTS (Jammy Jellyfish), 22.1, 23

When configured to run as a container, the agent runs as a privileged Docker container.

ARM64 Architecture​

Lacework supports the following ARM-based operating systems, including AWS Graviton and Graviton2 ARM-based instances.

Operating SystemVersions
AlmaLinux8.7, 9.1
Note: Package vulnerability scanning is not supported on AlmaLinux OS.
Amazon Linux2, 2022, 2023
CBL-Mariner2.0
CentOS6.10, 8.2, 9
Debian9, 10, 11, 12
Fedora30, 31, 32, 33, 34, 35
Red Hat Enterprise Linux7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 8.5, 8.6, 8.7, 8.8, 9
Red Hat OpenShift4.9
Red Hat OpenShift Service on AWS4.9, 4.10, 4.11, 4.12
Rocky Linux8.4, 8.5, 8.6, 8.7, 9.0, 9.1
SUSE12 SP5, 15 SP2, 15 SP3, 15 SP4
Ubuntu16.04, 17.04, 18.04, 19.04, 20.04, 21.04, 21.10, 22.04 LTS (Jammy Jellyfish), 22.1, 23

Container Runtime​

Container RuntimeMin. Agent Version
DockerdAll
Containerd> Agent v3.8.2
CRI-O> Agent v5.0
Agent Network Requirements πŸ“Ž

Connectivity​

You must allowlist the following URLs to enable the agent to communicate with the Lacework platform:

  • packages.lacework.net (for installing the agent)
  • updates.lacework.net : TCP/443 (for upgrading the agent)
  • api.lacework.net : TCP/443 (for US accounts)
  • aprodus2.agent.lacework.net : TCP/443 (for US accounts)
  • api.fra.lacework.net : TCP/443 (for EMEA accounts)
  • auprodn1.agent.lacework.net : TCP/443 (for ANZ accounts)
  • *.amazonaws.com (for retrieving metadata tags from AWS resources)
  • https://compute.googleapis.com (for retrieving metadata labels from GCP resources)
  • agentcheck.lacework.net
  • agentcheck.lacework.dev
  • agent.certprobe.lacework.net
note

Agents connect to agentcheck.lacework.net, agentcheck.lacework.dev, and agent.certprobe.lacework.net to enable Lacework to monitor agent connectivity with the Lacework platform. Lacework will notify you if an agent has connectivity issues.

If URLs cannot be used for rule writing:

  • api.lacework.net resolves to the following rotating IPs:

    34.209.102.252
    34.212.241.15
    34.212.79.17
    35.164.176.181
    44.225.189.230
    44.230.246.102
    52.35.54.98
    52.43.136.187
    54.185.31.7
    162.159.137.89
    162.159.138.89
    168.100.6.0/23
  • aprodus2.agent.lacework.net resolves to the following rotating IPs:

    162.159.137.89
    162.159.138.89
    168.100.6.0/23
  • api.fra.lacework.net resolves to the following rotating IPs:

    162.159.134.54
    162.159.135.54
    162.159.137.89
    162.159.138.89
    168.100.6.0/23
  • and auprodn1.agent.lacework.net resolves to the following IP:

    162.159.137.89
    162.159.138.89
    168.100.6.0/23

If required, the agent can be configured to use a network proxy by adding proxy information to the config.json agent configuration file or by creating an https_proxy environment variable.

Proxies​

Add Proxy Information to the Lacework Agent Configuration​

To include proxy information, edit the proxyurl key in the config.json file:

{
"proxyurl": "http://Your_Proxy_Server:Your_Port"
}

Or if your proxy requires a password:

{
"proxyurl": "http://username:password@Your_Proxy_Server:Your_Port"
}

Add Proxy Information for Kubernetes​

To include proxy information in a Kubernetes ConfigMap, you can use the same definition of a proxy as above, as illustrated in this sample lacework-cfg-k8s.yaml:

apiVersion: v1
kind: ConfigMap
metadata:
name: lacework-config
data:
config.json: |
{"tokens":{"AccessToken":"${LaceworkAccessToken}"}, "proxyurl":"http://Your_Proxy_Server:Your_Port"}

Add an https_proxy Environment Variable​

From the shell on the host where the agent resides, use the following command to add your proxy URL:

export https_proxy="http:Your_Proxy_Server:Your_Port"

Or if your proxy requires a password:

export https_proxy="http://username:password@Your_Proxy_Server:Your_Port"

Add a Certificate​

This section describes the certificates required for the Lacework clouds. If a certificate is not present in the trust store, the agent will not be able to communicate with the Lacework platform. Most current operating systems include the required certificate by default. In certain older operating systems, you might need to add it explicitly.

Certificate for the US Cloud​

The api.lacework.net US cloud supports the following Google Trust Services (GTS) Root R1 and GoDaddy certificates.

Google Trust Services (GTS) Root R1 Certificate​

The GTS Root R1 certificate is as follows:

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

GoDaddy Certificate​

The GoDaddy certificate is as follows:

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

Certificate for the APRODUS2, ANZ, and EU Cloud​

For the APRODUS2, ANZ, and EU cloud, Lacework supports the following Google Trust Services (GTS) Root R1 and Digicert Baltimore CyberTrust Root certificates.

Google Trust Services (GTS) Root R1 Certificate​

The GTS Root R1 certificate is as follows:

-----BEGIN CERTIFICATE-----
MIIFVzCCAz+gAwIBAgINAgPlk28xsBNJiGuiFzANBgkqhkiG9w0BAQwFADBHMQsw
CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU
MBIGA1UEAxMLR1RTIFJvb3QgUjEwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw
MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp
Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjEwggIiMA0GCSqGSIb3DQEBAQUA
A4ICDwAwggIKAoICAQC2EQKLHuOhd5s73L+UPreVp0A8of2C+X0yBoJx9vaMf/vo
27xqLpeXo4xL+Sv2sfnOhB2x+cWX3u+58qPpvBKJXqeqUqv4IyfLpLGcY9vXmX7w
Cl7raKb0xlpHDU0QM+NOsROjyBhsS+z8CZDfnWQpJSMHobTSPS5g4M/SCYe7zUjw
TcLCeoiKu7rPWRnWr4+wB7CeMfGCwcDfLqZtbBkOtdh+JhpFAz2weaSUKK0Pfybl
qAj+lug8aJRT7oM6iCsVlgmy4HqMLnXWnOunVmSPlk9orj2XwoSPwLxAwAtcvfaH
szVsrBhQf4TgTM2S0yDpM7xSma8ytSmzJSq0SPly4cpk9+aCEI3oncKKiPo4Zor8
Y/kB+Xj9e1x3+naH+uzfsQ55lVe0vSbv1gHR6xYKu44LtcXFilWr06zqkUspzBmk
MiVOKvFlRNACzqrOSbTqn3yDsEB750Orp2yjj32JgfpMpf/VjsPOS+C12LOORc92
wO1AK/1TD7Cn1TsNsYqiA94xrcx36m97PtbfkSIS5r762DL8EGMUUXLeXdYWk70p
aDPvOmbsB4om3xPXV2V4J95eSRQAogB/mqghtqmxlbCluQ0WEdrHbEg8QOB+DVrN
VjzRlwW5y0vtOUucxD/SVRNuJLDWcfr0wbrM7Rv1/oFB2ACYPTrIrnqYNxgFlQID
AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E
FgQU5K8rJnEaK0gnhS9SZizv8IkTcT4wDQYJKoZIhvcNAQEMBQADggIBAJ+qQibb
C5u+/x6Wki4+omVKapi6Ist9wTrYggoGxval3sBOh2Z5ofmmWJyq+bXmYOfg6LEe
QkEzCzc9zolwFcq1JKjPa7XSQCGYzyI0zzvFIoTgxQ6KfF2I5DUkzps+GlQebtuy
h6f88/qBVRRiClmpIgUxPoLW7ttXNLwzldMXG+gnoot7TiYaelpkttGsN/H9oPM4
7HLwEXWdyzRSjeZ2axfG34arJ45JK3VmgRAhpuo+9K4l/3wV3s6MJT/KYnAK9y8J
ZgfIPxz88NtFMN9iiMG1D53Dn0reWVlHxYciNuaCp+0KueIHoI17eko8cdLiA6Ef
MgfdG+RCzgwARWGAtQsgWSl4vflVy2PFPEz0tv/bal8xa5meLMFrUKTX5hgUvYU/
Z6tGn6D/Qqc6f1zLXbBwHSs09dR2CQzreExZBfMzQsNhFRAbd03OIozUhfJFfbdT
6u9AWpQKXCBfTkBdYiJ23//OYb2MI3jSNwLgjt7RETeJ9r/tSQdirpLsQBqvFAnZ
0E6yove+7u7Y/9waLd64NnHi/Hm3lCXRSHNboTXns5lndcEZOitHTtNCjv0xyBZm
2tIMPNuzjsmhDYAPexZ3FL//2wmUspO8IFgV6dtxQ/PeEMMA3KgqlbbC1j+Qa3bb
bP6MvPJwNQzcmRk13NfIRmPVNnGuV/u3gm3c
-----END CERTIFICATE-----

Digicert Baltimore CyberTrust Root Certificate​

The Digicert Baltimore CyberTrust Root Certificate is as follows:

-----BEGIN CERTIFICATE-----
MIIDdzCCAl+gAwIBAgIEAgAAuTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJJ
RTESMBAGA1UEChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJlclRydXN0MSIwIAYD
VQQDExlCYWx0aW1vcmUgQ3liZXJUcnVzdCBSb290MB4XDTAwMDUxMjE4NDYwMFoX
DTI1MDUxMjIzNTkwMFowWjELMAkGA1UEBhMCSUUxEjAQBgNVBAoTCUJhbHRpbW9y
ZTETMBEGA1UECxMKQ3liZXJUcnVzdDEiMCAGA1UEAxMZQmFsdGltb3JlIEN5YmVy
VHJ1c3QgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKMEuyKr
mD1X6CZymrV51Cni4eiVgLGw41uOKymaZN+hXe2wCQVt2yguzmKiYv60iNoS6zjr
IZ3AQSsBUnuId9Mcj8e6uYi1agnnc+gRQKfRzMpijS3ljwumUNKoUMMo6vWrJYeK
mpYcqWe4PwzV9/lSEy/CG9VwcPCPwBLKBsua4dnKM3p31vjsufFoREJIE9LAwqSu
XmD+tqYF/LTdB1kC1FkYmGP1pWPgkAx9XbIGevOF6uvUA65ehD5f/xXtabz5OTZy
dc93Uk3zyZAsuT3lySNTPx8kmCFcB5kpvcY67Oduhjprl3RjM71oGDHweI12v/ye
jl0qhqdNkNwnGjkCAwEAAaNFMEMwHQYDVR0OBBYEFOWdWTCCR1jMrPoIVDaGezq1
BE3wMBIGA1UdEwEB/wQIMAYBAf8CAQMwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3
DQEBBQUAA4IBAQCFDF2O5G9RaEIFoN27TyclhAO992T9Ldcw46QQF+vaKSm2eT92
9hkTI7gQCvlYpNRhcL0EYWoSihfVCr3FvDB81ukMJY2GQE/szKN+OMY3EU/t3Wgx
jkzSswF07r51XgdIGn9w/xZchMB5hbgF/X++ZRGjD8ACtPhSNzkE1akxehi/oCr0
Epn3o0WC4zxe9Z2etciefC7IpJ5OCBRLbf1wbWsaY71k5h+3zvDyny67G7fyUIhz
ksLi4xaNmjICq44Y3ekQEe5+NauQrz4wlHrQMz2nZQ/1/I6eYs9HRCwBXbsdtTLS
R9I4LtD+gdwyah617jzV/OeBHRnDJELqYzmp
-----END CERTIFICATE-----
Configure Agent Access to AWS Tags πŸ“Ž

The Lacework agent can retrieve user defined tags and other metadata from the AWS EC2 instances on which the agent is installed.

For the agent to retrieve user defined tags, the EC2 instance must have the DescribeTags IAM permission. For the agent to retrieve other metadata such as the ID of the organization in which the EC2 instance exists, the instance must have the DescribeOrganization IAM permission.

To provide the necessary permission, complete the following steps:

  1. Log in to the IAM service.

  2. Click Policies.

  3. Click Create policy.

  4. Click the JSON tab and replace the displayed policy with the following text.

        {
    Β  Β "Version": "2012-10-17",
    Β  Β "Statement": [
    Β  Β  Β  {
    Β  Β  Β  Β  Β "Effect": "Allow",
    Β  Β  Β  Β  Β "Action": [
    "ec2:DescribeTags",
    "organizations:DescribeOrganization"
    Β  Β  Β  Β  Β ],
    "Resource": "*"
    Β  Β  Β  }
    Β  Β ]
    }
  5. Click Next: Tags

  6. Click Next: Review.

  7. Enter a policy name and description.

  8. Click Create policy.

After creating the policy, associate it with an IAM role that can be attached to EC2 instances.

  1. Log in to the IAM service.
  2. Click Roles.
  3. Click Create role.
  4. Select AWS service as the trusted entity type and EC2 as the use case.
  5. Click Next.
  6. Search for the policy you created, click it, and click Next.
  7. Enter a role name, update the description if you want, and click Create role.

After creating the policy and role, navigate to the EC2 service and do the following:

  1. Select the instance for which you want to retrieve the tags and metadata.

  2. Under Actions > Security > Modify IAM role, select the IAM role you created and click Update IAM role.

    The next time the Lacework agent forwards data, you will see the AWS tags and metadata in the Machine Tag Summary table in the Machines dossier in the Lacework Console.

tip

In addition to retrieving AWS tags and metadata, you can add local tags to agents. For details, see Add Agent Tags.

Configure Agent Access to Google Cloud Tags πŸ“Ž

Google Cloud supports user-defined labels to organize your Google Cloud resources. For more information, see Creating and Managing Labels.

For the Lacework agent to be able to retrieve user-defined labels on Google Compute Engine (GCE) instances, the service account associated with the instance must have sufficient authorization to retrieve this information over the Compute Engine API. In particular, the instance and its associated service account must possess:

  • Read access to the GCE API
  • compute.instances.get IAM permission

Configure Access to the Google Compute Engine API​

The GCE instance requires the compute.readonly OAuth scope, but broader scopes, such as compute and cloud-platform, also fulfill this minimum level of permission. The default GCE instance policy does not usually contain this scope. So, you need to configure this level of permission to allow Lacework to access the GCE API.

  1. In the Google Cloud Console, click Compute Engine, select the VM Instances page, and then select your instance.

  2. Stop your instance.

  3. On your instance’s page, click Show Details under API and identity management.

  4. See if the menu item for the Compute Engine API is set to either Read Only or Read Write (corresponding to the compute.readonly and compute OAuth scopes, respectively). Alternatively, see if the Cloud API access scopes is set to Allow Full Access (corresponding to the cloud-platform scope).

  5. If the instance does not have any of the permissions described, click Edit.

  6. Scroll down to find a series of drop-downs that grant access to the various Google Cloud APIs and locate the Compute Engine API dropdown.

    windows-agent-gcp-compute-engine.png

  7. Select the Read Only option.

  8. Select Save at the bottom of this page.

  9. Restart your instance.

Validate Permissions for your Service Account​

Most service accounts will be configured with the predefined Editor role and will have enough permissions to allow Lacework to access GCE, requiring no further action on your part. However, if your organization configures GCE service accounts differently, then your service account may not have enough permission. In this case, you or your administrator must either:

  • Add a new role to the service account that contains this permission: OR
  • Add the permission to a role that the service account already has. Note that this option is only available for custom roles.

For information about viewing and setting up roles for your service account, see Manage access to projects, folders, and organizations.