Skip to main content

AQUILA - AWS Integration

Overview


The AWS Integration enables the collection of logs and metrics from your Amazon Web Services (AWS) environment. This integration helps centralize security and operational data for monitoring, investigation, and reporting.

Note: Using this integration will generate additional CloudWatch API request charges on your AWS account.

Data Streams


The AWS integration collects two main types of data:

  1. Logs – Records of events that occur within your AWS account.
    Examples:

    • Every request received by CloudFront

    • Actions performed by AWS users or roles

    • API activity captured by CloudTrail

  2. Metrics – Real-time insights into the performance and health of AWS services.
    Examples:

    • CPU utilization of EC2 instances

    • S3 storage usage

    • RDS performance metrics

    • AWS cost and usage breakdowns

Requirements


Before configuring the AWS integration, ensure you have:

  1. AWS Credentials – To connect to your AWS account.

  2. AWS Permissions – To grant access to the necessary AWS API calls.services.

AWSStep Credentials1. Create IAM User and Custom Policy

  1. AccessIAM KeysUser
    -an identity you create in AWS Identity and Access Management (IAM) that represents a person or application which needs to interact with your AWS resources.

  2. User Policy and Permissions

The IAM User must be granted the following permissions:

{
	"Version": "2012-10-17",
	"Statement": [
		{
			"Effect": "Allow",
			"Action": [
				"ce:GetCostAndUsage",
				"cloudwatch:GetMetricData",
				"cloudwatch:ListMetrics",
				"ec2:DescribeInstances",
				"ec2:DescribeRegions",
				"iam:ListAccountAliases",
				"inspector2:ListFindings",
				"logs:DescribeLogGroups",
				"logs:FilterLogEvents",
				"organizations:ListAccounts",
				"rds:DescribeDBInstances",
				"rds:ListTagsForResource",
				"s3:GetBucketLocation",
				"s3:GetObject",
				"s3:ListBucket",
				"sns:ListTopics",
				"sqs:ChangeMessageVisibility",
				"sqs:DeleteMessage",
				"sqs:GetQueueAttributes",
				"sqs:ListQueues",
				"sqs:ReceiveMessage",
				"sts:AssumeRole",
				"sts:GetCallerIdentity",
				"tag:GetResources"
			],
			"Resource": "*"
		}
	]
}

 


Step 2: Create Access Key

Long-term credentials associated with an IAM user or the AWS root account.

    1. accessAccess keyKey idID – First part of the access key

    2. secretSecret accessAccess keyKey – Second part of the access key

Step 3: Create a CloudTrail Trail and Send Logs to S3

Set up an AWS CloudTrail trail to record account activity and deliver log files into an S3 bucket for secure storage, auditing, and compliance monitoring.

  1. Open CloudTrail > Create a New Trail
  2. Trail Settings

    • Trail name: Enter a unique name.

    • Apply trail to all accounts in my organization.

  3. Choose an S3 Bucket

    • Storage location → Select Create new S3 bucket or Use existing bucket.

     If using new bucket:

    • Enter a bucket name.

    • CloudTrail will create the bucket and add the correct permissions.

     If using existing bucket:

    • Select your bucket from the dropdown.

    • CloudTrail will prompt you to allow access. Click Yes to let CloudTrail update the bucket policy.

  4. Additional Settings

    • Enable for all accounts in my organization
    • Log file SSE-KMS encryption: Enable if you want encryption with a KMS key(optional).

    • Log file validation: Enable to verify log integrity.

  5. Choose Log Events
    1. Event Type
      • Management events - Capture management operations performed on your AWS resources.
      • Data events - Log the resource operations performed on or within a resource.
      • Insights events - Identify unusual activity, errors, or user behavior in your account.
      • Network activity events - Network activity events provide information about resource operations performed on a resource within a virtual private cloud endpoint.
    2. IAMManagement Roleevents:

      ARN
      • Check Read
        An(default IAMis Roleusually ARNAll).

        defines
      • permissions without requiring long-term credentials.
        When assumed, the role provides temporary security credentials.
        Recommended for secure integrations and cross-account access.

  6. EC2 Instance IAM Role
    If the AQUILA Agent runs on an EC2 instance with an attached IAM role, the agent can authenticate automatically.
    Uses temporary credentials from the Instance Metadata Service (IMDS).
    Preferred method for securityReview and automation.

    AWS Permissions


    The IAM user or role must be granted the following permissions:Create

    • ce:GetCostAndUsageReview your configuration summary.

    • cloudwatch:GetMetricData

      Click
    • Create
    • cloudwatch:ListMetrics

    • ec2:DescribeInstances

    • ec2:DescribeRegions

    • iam:ListAccountAliases

    • inspector2:ListFindings

    • logs:DescribeLogGroups

    • logs:FilterLogEvents

    • organizations:ListAccounts

    • rds:DescribeDBInstances

    • rds:ListTagsForResource

    • s3:GetBucketLocation

    • s3:GetObject

    • s3:ListBucket

    • sns:ListTopics

    • sqs:ChangeMessageVisibility

    • sqs:DeleteMessage

    • sqs:GetQueueAttributes

    • sqs:ListQueues

    • sqs:ReceiveMessage

    • sts:AssumeRole

    • sts:GetCallerIdentity

    • tag:GetResourcestrail.

 

To configure the AWS Integration:

Please provide the following information to CyTech Support: 

  • Access key ID
  • Secret Access Key
  • Region

  • CloudTrailTrail Log GroupCollection > S3 Bucket ARN

 

 

If you need further assistance, kindly contact our support at support@cytechint.com for prompt assistance and guidance.