How to integrate aws waf & inspector

200 views
Skip to first unread message

ismailctest C

unread,
Feb 20, 2023, 12:28:33 AM2/20/23
to Wazuh mailing list
Hi,
Kindly share the steps to integrate aws waf and inspector.

WAF:
Integrated as per the below doc, but the logs are not receiving.

Inspector:
Please share the doc & what configuration need to be done in aws side.
Not getting idea when checking the below link.

ismailctest C

unread,
Feb 20, 2023, 7:21:33 AM2/20/23
to Wazuh mailing list
Hi Team,
Please help on this.

Jose Luis Carreras Marin

unread,
Feb 20, 2023, 8:29:07 AM2/20/23
to Wazuh mailing list
Hello Ismail

Let's dig deeper into these problems you are having.

For the Amazon WAF configuration, have you encountered any problems in any of the steps shown in the documentation? Any errors or something that might have gone wrong? All the information you can give me will be helpful to solve the problem.
You can check the Wazuh log file (ossec.log) to see if there are any warning or error messages that can give us more clues.

For Amazon Inspector, the documentation says:
"Amazon Inspector does not need to store logs into a bucket, like the other AWS services. The inspector works as a searcher, so it retrieves information using the AWS API and provides an agent that analyzes it."
So no extra configuration file should be needed to view the vulnerabilities found.

If you can show me the Wazuh configuration file (ossec.conf) of the agent it would be very useful. Any info could be a good hint.

Regards, Jose

ismailctest C

unread,
Feb 28, 2023, 2:24:50 AM2/28/23
to Wazuh mailing list
Hi,
WAF configured and working fine.

Still pending Inspector configuration.
The below configuration has been done in ossec.conf of manager.
<wodle name="aws-s3">
  <disabled>no</disabled>
  <interval>10m</interval>
  <run_on_start>no</run_on_start>
  <skip_on_error>no</skip_on_error>
  <service type="inspector">
    <aws_profile>default</aws_profile>
  </service>
</wodle>

What is the next configuration and what needs to be configured/done in aws side?

ismailctest C

unread,
Mar 5, 2023, 11:58:51 PM3/5/23
to Wazuh mailing list
Hi,
Please help to get an update on this.

Jose Luis Carreras Marin

unread,
Mar 6, 2023, 5:33:58 AM3/6/23
to Wazuh mailing list
Hi Ismail,
the documentation also specifies that you need to add at least one region when you configure the AWS inspector service.
Users must specify at least a region. Multiple regions can be added separated by commas.

To add a region to the configuration, I show you an example here:


<wodle name="aws-s3">
  <disabled>no</disabled>
  <interval>10m</interval>
  <run_on_start>no</run_on_start>
  <skip_on_error>no</skip_on_error>
  <service type="inspector">
    <aws_profile>default</aws_profile>
    <regions>us-east-1,us-east-2</regions>
  </service>
</wodle>


You can see the configuration in our docu:
https://documentation.wazuh.com/current/user-manual/reference/ossec-conf/wodle-s3.html#service-regions

Finally, if it still doesn't work, could you show me the /var/ossec/logs/ossec.log file of the manager? Maybe there is some clue of what may be happening. 
Regards, Jose

ismailctest C

unread,
Mar 6, 2023, 11:58:51 PM3/6/23
to Wazuh mailing list
Hi Jose,
Please find the ossec.log
2023/03/07 04:56:14 wazuh-modulesd:aws-s3: INFO: Executing Service Analysis: (Service: inspector, Profile: default)
2023/03/07 04:56:14 wazuh-modulesd:aws-s3: WARNING: Service: inspector  -  Returned exit code 12
2023/03/07 04:56:14 wazuh-modulesd:aws-s3: WARNING: Service: inspector  -  An error occurred (AccessDeniedException) when calling the ListFindings operation: User: arn:aws:iam::21247xxxxxx:user/wazuh-SIEM is not authorized to perform: inspector:ListFindings because no identity-based policy allows the inspector:ListFindings action
2023/03/07 04:56:14 wazuh-modulesd:aws-s3: INFO: Fetching logs finished.

Jose Luis Carreras Marin

unread,
Mar 7, 2023, 7:37:20 AM3/7/23
to Wazuh mailing list
Hello Ismail,

It is necessary to set the name of the profile that has access to the aws service. You need to specify it in the configuration line:
<aws_profile>default</aws_profile>\

Reply all
Reply to author
Forward
0 new messages