AQUILA - AWS Integration
Overview
The AWS Integration enables the collection of logs and metrics from your Amazon Web Services (AWS) environment. This integration helps centralize security and operational data for monitoring, investigation, and reporting.
Note: Using this integration will generate additional CloudWatch API request charges on your AWS account.
Data Streams
The AWS integration collects two main types of data:
-
Logs – Records of events that occur within your AWS account.
Examples:-
Every request received by CloudFront
-
Actions performed by AWS users or roles
-
API activity captured by CloudTrail
-
-
Metrics – Real-time insights into the performance and health of AWS services.
Examples:-
CPU utilization of EC2 instances
-
S3 storage usage
-
RDS performance metrics
-
AWS cost and usage breakdowns
-
Requirements
Before configuring the AWS integration, ensure you have:
-
AWS Credentials – To connect to your AWS account.
-
AWS Permissions – To grant access to the necessary AWS
API calls.services.
AWSStep Credentials1. Create IAM User and Custom Policy
-
AccessIAMKeysUser
-an identity you create in AWS Identity and Access Management (IAM) that represents a person or application which needs to interact with your AWS resources. - User Policy and Permissions
The IAM User must be granted the following permissions:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ce:GetCostAndUsage",
"cloudwatch:GetMetricData",
"cloudwatch:ListMetrics",
"ec2:DescribeInstances",
"ec2:DescribeRegions",
"iam:ListAccountAliases",
"inspector2:ListFindings",
"logs:DescribeLogGroups",
"logs:FilterLogEvents",
"organizations:ListAccounts",
"rds:DescribeDBInstances",
"rds:ListTagsForResource",
"s3:GetBucketLocation",
"s3:GetObject",
"s3:ListBucket",
"sns:ListTopics",
"sqs:ChangeMessageVisibility",
"sqs:DeleteMessage",
"sqs:GetQueueAttributes",
"sqs:ListQueues",
"sqs:ReceiveMessage",
"sts:AssumeRole",
"sts:GetCallerIdentity",
"tag:GetResources"
],
"Resource": "*"
}
]
}
Step 2: Create Access Key
Long-term credentials associated with an IAM user or the AWS root account.
-
-
accessAccesskeyKeyidID – First part of the access key -
secretSecretaccessAccesskeyKey – Second part of the access key
-
Step 3: Create a CloudTrail Trail and Send Logs to S3
Set up an AWS CloudTrail trail to record account activity and deliver log files into an S3 bucket for secure storage, auditing, and compliance monitoring.
- Open CloudTrail > Create a New Trail
-
Trail Settings
-
Trail name: Enter a unique name.
-
Apply trail to all accounts in my organization.
-
-
Choose an S3 Bucket
-
Storage location → Select Create new S3 bucket or Use existing bucket.
If using new bucket:
-
Enter a bucket name.
-
CloudTrail will create the bucket and add the correct permissions.
If using existing bucket:
-
Select your bucket from the dropdown.
-
CloudTrail will prompt you to allow access. Click Yes to let CloudTrail update the bucket policy.
-
-
Additional Settings
- Enable for all accounts in my organization
-
Log file SSE-KMS encryption: Enable if you want encryption with a KMS key(optional).
-
Log file validation: Enable to verify log integrity.
- Choose Log Events
- Event Type
- Management events - Capture management operations performed on your AWS resources.
- Data events - Log the resource operations performed on or within a resource.
- Insights events - Identify unusual activity, errors, or user behavior in your account.
- Network activity events - Network activity events provide information about resource operations performed on a resource within a virtual private cloud endpoint.
-
IAMManagementRoleevents:ARN-
Check Read
An(defaultIAMisRoleusuallyARNAll).defines
permissions without requiring long-term credentials.When assumed, the role provides temporary security credentials.Recommended for secure integrations and cross-account access. -
- Event Type
-
EC2 Instance IAM RoleIf the AQUILA Agent runs on an EC2 instance with an attached IAM role, the agent can authenticate automatically.Uses temporary credentials from the Instance Metadata Service (IMDS).Preferred method for securityReview andautomation.AWS PermissionsThe IAM user or role must be granted the following permissions:Create-
ce:GetCostAndUsageReview your configuration summary. -
Clickcloudwatch:GetMetricDataCreate cloudwatch:ListMetricsec2:DescribeInstancesec2:DescribeRegionsiam:ListAccountAliasesinspector2:ListFindingslogs:DescribeLogGroupslogs:FilterLogEventsorganizations:ListAccountsrds:DescribeDBInstancesrds:ListTagsForResources3:GetBucketLocations3:GetObjects3:ListBucketsns:ListTopicssqs:ChangeMessageVisibilitysqs:DeleteMessagesqs:GetQueueAttributessqs:ListQueuessqs:ReceiveMessagests:AssumeRolests:GetCallerIdentitytag:GetResourcestrail .
-
To configure the AWS Integration:
Please provide the following information to CyTech Support:
- Access key ID
- Secret Access Key
-
Region
-
CloudTrailTrail LogGroupCollection > S3 Bucket ARN
If you need further assistance, kindly contact our support at support@cytechint.com for prompt assistance and guidance.