Skip to content

Microsoft Sentinel

The following document outlines how external SIEM solutions, such as Microsoft Sentinel, can integrate with the Skpr hosting platform.

Credentials

The Skpr platform team will provision a role in accordance with the following Microsoft document.

Implementation

CloudTrail

Actions taken by a user, role, or an AWS service are recorded as events in CloudTrail.

The Skpr platform team have developed a logging pipeline which provides you with a filtered set of CloudTrail logs that are associated with your developer account interactions.

The diagram below outlines the flow of event logs through the system.

CloudTrail log flow diagram

Integration Points

Service Format
SQS Queue item in the format of a S3 put notification
S3 CloudTrail log files stored as compressed JSON (gzip)

CloudWatch Logs

The Skpr hosting platform stores all platform logging data in CloudWatch Logs.

The Skpr platform team can, at the request of the client, provision additional infrastructure for extracting these logs and storing them in a way which is compatible with the Microsoft Sentinel S3 connector.

Examples of logs which can be exported include:

  • CloudFront
  • Application

The diagram below outlines the flow of event logs through the system.

CloudWatch log flow diagram

Integration Points

Service Format
SQS Queue item in the format of a S3 put notification
S3 Objects are stored as compressed JSON (gzip)

Resources