Deployment steps

Launch the CloudFormation template in the AWS Organizations management account

This option creates all of the necessary resources for ingestion of AWS security logs into the DeepWatch MDR platform. During the deployment, you can choose which options to enable for the individual services.

  1. Download the CloudFormation template

  2. Launch the CloudFormation template from your AWS Control Tower home Region.

    • Stack name: template-deepwatch-enable-integrations
      • pDeepwatchRoleName: deepwatch-mdr-role
      • pSRAS3BucketRegion: us-east-1
      • pSRASourceS3BucketName: aws-abi
      • pAutoEnableMalwareProtection: false
      • pAutoEnableKubernetesAuditLogs: false
      • pAutoEnableS3Logs: true
      • pEnableS3DataEvents: true
      • pEnableLambdaDataEvents: true
      • pCreateAWSControlTowerExecutionRole: true # Set to false if you have already created the AWSControlTowerExecution role in the management account Note: Include below parameters if you are deploying this solution in an Organization with no Control Tower.
      • pControlTower: false
      • pLogArchiveAccountId: 111111111111 # Your log-archive-account-id
      • pSecurityAccountId: 222222222222 # Your audit-account-id
      • pGovernedRegions: ‘us-east-1,us-east-2’ # List of regions
      • pSRASourceS3BucketName: aws-abi
      • pAdminRoleName: ‘AWSCloudFormationStackSetAdministrationRole’ # Replace with your admin role name
      • pExecRoleName: ‘AWSCloudFormationStackSetExecutionRole’ # Replace with your exec role name
  3. To launch the stack, choose the Capabilities and then Submit.

    [x] I acknowledge that AWS CloudFormation might create IAM resources with custom names.

    [x] I acknowledge that AWS CloudFormation might require the following capability: CAPABILITY_AUTO_EXPAND

Wait for the CloudFormation status to change to CREATE_COMPLETE.

Launch using Customizations for Control Tower

Customizations for AWS Control Tower combines AWS Control Tower and other highly available, trusted AWS services to help customers set up a secure, multiaccount AWS environment according to AWS best practices. You can add customizations to your AWS Control Tower landing zone using an AWS CloudFormation template and service control policies (SCPs). You can deploy the custom template and policies to individual accounts and organizational units (OUs) within your organization.

CfCT also integrates with AWS Control Tower lifecycle events to hlep ensure that resource deployments stay in sync with your landing zone. For example, when you create a new account using AWS Control Tower account factory, CfCT deploys all of the resources that are attached to the account.

The templates provided by this ABI package are deployable through CfCT.

Prerequisites

The CfCT solution can’t launch resources in the management account by default. You need select pCreateAWSControlTowerExecutionRole : true to allow the stack to create the role or must manually create a role in that account that has necessary permissions.

How it works

To deploy this sample partner integration page using CfCT, add the following blurb to the manifest.yaml file from your CfCT solution and update the account names as needed.

resources:
  - name: deepwatch-logging-top-level
    resource_file: https://aws-abi.s3.us-east-1.amazonaws.com/cfn-abi-deepwatch-mdr/templates/deepwatch-root-stack.yaml
    deploy_method: stack_set
    parameters:
      - parameter_key: pSRASourceS3BucketName
        parameter_value: aws-abi
      - parameter_key: pSRAS3BucketRegion
        parameter_value: us-east-1
      - parameter_key: pAutoEnableS3Logs
        parameter_value: 'true'
      - parameter_key: pAutoEnableKubernetesAuditLogs
        parameter_value: 'false'
      - parameter_key: pAutoEnableMalwareProtection
        parameter_value: 'false'
      - parameter_key: pDeepwatchRoleName
        parameter_value: 'deepwatch-mdr-role'
      - parameter_key: pEnableLambdaDataEvents
        parameter_value: 'false'
      - parameter_key: pEnableS3DataEvents
        parameter_value: 'true'
    deployment_targets:
      accounts:
        - [[MANAGEMENT-AWS-ACCOUNT-ID]]

Next: Postdeployment options