Trend Micro AWS Built-In module

This document walks you through the process of deploying the Trend Micro AWS Built-In (ABI) module to the AWS Cloud. It’s intended for customers who are using the cfn-abi-trend-cloudone ABI and building an ABI project.

The AWS Built-In program validates solutions that are integrated with relevant AWS foundational services such as identity, management, security, and operations. This program helps customers find and deploy a validated solution that addresses specific customer use cases while providing visibility and control of AWS native service integrations.

Next: Overview

Subsections of Trend Micro AWS Built-In module

Overview

This ABI deploys Trend Micro integrations for AWS Organizations to the AWS Cloud. It’s for cloud operations, SecOps, cloud builders, and others who want to implement security across multiple AWS accounts. If you are unfamiliar with AWS Built-In, refer to AWS Built-In.

Deploying this ABI package does not guarantee an organization’s compliance with any laws, certifications, policies, or other regulations.

Security outcomes

The Trend Micro AWS Built-In module can be used to help you set up two different security outcomes across your organization.

AWS CloudTrail analysis

The XDR capability of Trend Micro Vision One applies effective expert analytics and global threat intelligence using data collected across multiple vectors, such as emails, endpoints, servers, cloud workloads, and networks. It can also analyze the AWS CloudTrail logs from your AWS accounts, identify threats and attacks, alert you to problems, and create a visualization of the log.

This ABI module integrates your organizational trail with Trend Vision One, which helps ensure that all CloudTrail events across all accounts in your organization are analyzed by Vision One.

EC2 instance security agent deployment via SSM

Distributor is an integrated feature of AWS Systems Manager that you can use to store and distribute software packages in your accounts. By integrating Workload Security with AWS Systems Manager Distributor, you can distribute Cloud One Workload Security agents across multiple platforms, control access to managed instances, and automate your deployments.

This ABI module is deployed across either selected or all accounts and Regions. It helps ensure that the Trend Cloud One Workload Security agent deploys to your targeted EC2 instances.

AWS Marketplace listings

Next: Terminology

Terminology

  • ABI : AWS Built-In (ABI).
  • ABI modules: GitHub repositories based on AWS SRA, which provide templates for enabling AWS foundational services such as AWS CloudTrail, Amazon GuardDuty, AWS Security Hub, and other security services.
  • ABI projects: The GitHub repositories built by partners in collaboration with AWS. While building these projects, partners use ABI modules to enable AWS services as needed before creating partner-specific assets. A project contains the following:
  • IaC templates to automate enablement of both AWS and partner services
  • Wrappers for common formats like CfCT manifest, SC baselines, and others to allow customers to pick and choose available services. For this package, we focus on including only the CfCT manifest file.
  • Trend Cloud One: A platform built for cloud builders, where you can secure your cloud infrastructure.
  • Trend Vision One: A platform that enhances and consolidates detection, investigation, and response capabilities across emails, endpoints, servers, cloud workloads, and networks.

Next: Cost and licenses

Costs and licenses

Trend Micro licensing costs

For current pricing, refer to Trend Cloud One and Trend Enterprise Security Solutions on AWS Marketplace.

AWS service costs

  • Secrets Manager:

    • One secret.
    • Storage is $0.40 per secret per month, and API interactions are $0.05 per 10,000 API calls.
  • SSM Parameter Store:

    • Four parameters using standard throughput.
    • No additional charge for storage and standard throughput.
  • Note: You are responsible for the cost of the AWS services and any third-party licenses used while running this solution.

Next: Architecture

Architecture

Deploying this ABI package with default parameters builds the following architectures.

AWS CloudTrail integration architecture diagram

AWS CloudTrail integration architecture diagram AWS CloudTrail integration architecture diagram

As shown in the diagram, this integration sets up the following:

  • In the log archive account:
    • Amazon CloudWatch events rules to detect new PUTs in the organizational CloudTrail S3 bucket and trigger an AWS Lambda function.
    • The Lambda function forwards the new CloudTrail events to Trend Vision One.
SSM integration architecture diagram

SSM integration architecture diagram SSM integration architecture diagram

  • In each AWS Organizations account:
    • Four system-manager parameters are created in each AWS Region.
    • For a defined CRON job, the AWS Systems Manager workload security agent association package triggers for ‘*’ instances managed by SSM.
    • The SSM association package deploys workload security agent for unmanaged instances.

Next: Deployment Options

Deployment steps

Launch the CloudFormation template in the AWS Organizations management account

  1. Download the CloudFormation template to your local machine.

  2. Launch the CloudFormation template in your AWS Control Tower home Region.

    • Stack name: template-trend-micro-enable-integrations
    • List parameters with [call out default values and update below example as needed]
      • Mandatory parameters
      • Parameters for the ABI module:
        • DeployCloudTrailIntegration: true
        • DeploySSMIntegration: true
        • DeploySecurityHubIntegration: true
      • Parameters related to the CloudTrail integration:
      • Parameters related to the SSM integration:
        • CronJob: cron(15 10 * * ? *)
        • AccountAdminStatus: SELF
      • Parameters related to the Security Hub integration:
        • EnableSecurityHub: Set to false unless you don’t have Security Hub enabled. Set to true to enable Security Hub in the audit account.
  3. Choose both the Capabilities and then Submit to launch the stack.

    [] I acknowledge that AWS CloudFormation might create IAM resources with custom names.

    [] I acknowledge that AWS CloudFormation might require the following capability: CAPABILITY_AUTO_EXPAND

Wait for the CloudFormation status to change to CREATE_COMPLETE.

Launch using Customizations for Control Tower

CfCT combines AWS Control Tower and other highly available, trusted AWS services to help customers more quickly set up a secure, multiaccount AWS environment according to AWS best practices. You can add customizations to your AWS Control Tower landing zone using an AWS CloudFormation template and service control policies (SCPs). You can deploy the custom template and policies to individual accounts and organizational units within your organization.

CfCT also integrates with AWS Control Tower lifecycle events to help ensure that resource deployments stay in sync with your landing zone. For example, when a new account is created using the AWS Control Tower account factory, CfCt helps to ensure that all resources attached to the account’s organizational unit are automatically deployed.

The templates provided as part of the ABI packages are deployable using CfCT. For more information, refer to Prerequisites.

Prerequisites

  1. For CfCT to launch resources from the management account, you must create a role with necessary permissions in that account.

How it works

To deploy this integration page using CfCT, add the following blurb to the manifest.yaml file, and update the accounts and organizational units as needed.

resources:
  - name: sra-enable-partner1-solution
    resource_file: https://aws-abi.s3.us-east-1.amazonaws.com/cfn-abi-trend-cloudone/templates/main.template.yaml
    deploy_method: stack_set
    parameters:
      - parameter_key: pProductArn
        parameter_value: arn:aws:securityhub:us-east-1::product/cloud-custodian/cloud-custodian
      - parameter_key: pSRASourceS3BucketName
        parameter_value: aws-abi
      - parameter_key: pSRAStagingS3KeyPrefix
        parameter_value: cfn-abi-aws-reference-guide
      - parameter_key: CloudOneApiKey
        parameter_value: Your Cloud One API key. For more information, refer to [Manage API keys](https://cloudone.trendmicro.com/docs/identity-and-account-management/c1-api-key/).
      - parameter_key: OrganizationId
        parameter_value: Your AWS Organization ID. For more information, refer to [Viewing details about your organization](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_org_details.html).
      - parameter_key: DeployCloudTrailIntegration
        parameter_value: true
      - parameter_key: DeploySSMIntegration
        parameter_value: true
      - parameter_key: DeploySecurityHubIntegration
        parameter_value: true
      - parameter_key: VisionOneAuthenticationToken
        parameter_value: Vision One authentication token. For more information, refer to [Obtaining API Keys for Third-Party Apps](https://docs.trendmicro.com/en-us/enterprise/trend-vision-one-olh/administrative-setti/user-accounts/obtaining-api-keys-f_001.aspx).
      - parameter_key: VisionOneRegion
        parameter_value: Vision One Region. For more information, refer to [Regional Domains](https://automation.trendmicro.com/xdr/Guides/Regional-Domains).
      - parameter_key: ExistingOrganizationalCloudtrailBucketName
        parameter_value: Bucket name of an existing Organizational CloudTrail. For more information, refer to [Creating a trail for an organization](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html).
      - parameter_key: CronJob
        parameter_value: cron(15 10 * * ? *)
      - parameter_key: AccountAdminStatus
        parameter_value: SELF
      - parameter_key: EnableSecurityHub
        parameter_value: false
    deployment_targets:
      accounts:
        - [[MANAGEMENT-AWS-ACCOUNT-ID]]

Next: Postdeployment options

Postdeployment options

Verifying the solution functionality

Verifying the solution functionality depends on what modules and integrations you deployed in the previous step.

Verifying CloudTrail analysis

  1. Log in to your Trend Cloud One account.
  2. Choose Integrations at the bottom of the page and then Trend Vision One from the left-hand side of the page.
  3. Verify that the status of AWS CloudTrail is Connected.
  4. Log in to your Vision One account.
  5. In the Trend Vision One console, navigate to XDR Threat Investigation > Search.
  6. Change the search method to Cloud Activity Data.
  7. Locate your CloudTrail data. For example, use the following search string: *
  8. The presence of data means that the CloudTrail analysis deployed successfully.

Verifying EC2 instance security agent deployment via SSM

  1. Log in to your Trend Cloud One account.
  2. Choose Endpoint & Workload Security, and then choose the Computers tab.
  3. Verify that the Agent Status Light Column has a green indicator.
  4. A green indicator means the agent deployed successfully.

Next: Test the deployment

Additional resources

Partner documentation

AWS services

FAQs

Info

The FAQ is empty right now but will be updated as questions from customers come in after release.

Refer to the FAQs page.

Other documentation

Next: Troubleshooting

Troubleshooting

Common ABI issues

For troubleshooting common ABI issues, refer to the AWS Built-In General Information Guide and Troubleshooting CloudFormation.

SSM integration

No green indicator

  1. Log in to your AWS account.
  2. Navigate to Systems Manager > Parameter Store, and confirm that the four created parameters exist.
  3. Navigate to Systems Manager > State Manager.
  4. For agent association details, choose Association ID > Execution History > Failed execution.

Next: Feedback

Notices

This document is provided for informational purposes only. It represents current AWS product offerings and practices as of the date of issue of this document, which are subject to change without notice. Customers are responsible assessing the information in this document and any use of AWS products or services, each of which is provided “as is” without warranty of any kind, whether expressed or implied. This document does not create any warranties, representations, contractual commitments, conditions, or assurances from AWS, its affiliates, suppliers, or licensors. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and this document is not part of, nor does it modify, any agreement between AWS and its customers.

The software included with this paper is licensed under the Apache License, version 2.0 (the “License”). You may not use this file except in compliance with the License. A copy of the License is located at http://aws.amazon.com/apache2.0/ or in the accompanying “license” file. This code is distributed on an “as is” basis, without warranties or conditions of any kind, either expressed or implied. Refer to the License for specific language governing permissions and limitations.

Cleanup instructions

Cleanup instructions

Delete the parent CloudFormation stack. No other actions are necessary.

FAQs

How do I contribute to this repository?

This solution is covered under Apache License version 2.0 (the “License”). For problems, submit a GitHub Issue. If you want to contribute a fix or enhancement, submit a GitHub pull request with your changes. All pull requests are reviewed before being merged.