#eventbridge — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #eventbridge, aggregated by home.social.
-
We've got new cloud-native integrations with AWS Security Hub and Amazon #EventBridge! 🎉 Now you can get real-time event ingestion and support for the Open #Cybersecurity Schema Framework (OCSF)—which streamlines AWS log analysis and accelerates threat detection. And, with this new Amazon EventBridge integration events now flow into #Graylog the moment they occur, enabling real-time threat detection and faster response to incidents. 🙌
Learn more about OCSF support for seamless #AWS Security Hub integration, how these new capabilities are designed specifically for cloud-first teams using Graylog, and more. 👇
https://www.businesswire.com/news/home/20251202476132/en/Graylog-Boosts-Security-Visibility-with-Real-Time-Event-Ingestion-and-OCSF-Support-with-AWS-Security-Hub?_gl=1*1mn0cnh*_gcl_au*NzcyNDU4NjQzLjE3NjAwMzE1NjI.*_ga*MjUxODEwNDk4LjE3NjAwMzE1NjI.*_ga_ZQWF70T3FK*czE3NjQ3MDIwNTkkbzUxJGcxJHQxNzY0NzAyODkwJGo1NCRsMCRoMA #CyberSecurity #SIEM #ThreatDetection
-
I wanted to automatically disable an IAM user when it does something suspicious. Since this IAM user is used by a script I know that when it deviates that is a good indicator that it was compromised and I need to investigate.
How hard could it be?
Well, it turned out to be a frustrating experience. CloudTrail records events done by users, so this should be easy to setup. But then I started to encounter problems:
* Only the first CloudTrail event is free, so I did not want to create more than one trail
* CloudTrail sends events to EventBridge but only for the current region, which is not enoughI have an organizational trail in the management account. Let's see how easy it is to send these events into a member account!
* CloudTrail can send events to a CloudWatch log then I could set up a subscription filter. This worked for a PoC but ultimately there is a limit of 2 for subscription filters for a log group. So this was a no-go
* Otherwise it writes to S3, so I had to have a Lambda reading the objects as CloudTrail writes themAt this point I had a Lambda that got all CloudTrail events and filters out the interesting ones: ones with AccessDenied error, GetCallerIdentity, and ConsoleLogin. That should be a good start.
EventBus Rules can send events based on a filter, so forwarding these events into an EventBus seems like a good idea. So so far the chain is: CloudTrail => S3 => Lambda => EventBus.
But how can I send these events to the member account? Well, an EventBus Rule, of course. So I created an EventBus in the member account.
Next issue: a CloudFormation stack can't create an EventBus Rule in a different region. Interestingly, it is possible to create *cross-account* but not cross-region. So I needed an EventBus in the target region as well and set up a Rule to forward events there.
Then the very last step is to set up a Rule to filter events for the IAM user(s) and set up a CloudWatch alarm that calls a Lambda that attaches the DenyAll policy to the user.
Since I wanted everything managed by CloudFormation I ended up with an enormous amount of stacks:
* (mgmt acc us-east-1) CloudTrail + Lambda + EventBus
* (mgmt acc us-east-1) EventBus Rule to forward events to the member account
* (member acc us-east-1) EventBus to receive events from the mgmt account
* (member acc us-east-1) EventBus Rule to forward events to the regional EventBus
* (member acc eu-west-1) The target stack with the IAM users and an EventBus to receive events toWhat makes it a particularly annoying experience is that there are so many small limitations that make a simpler solution impossible:
* CloudTrail should support filtering by events so that the whole management account => member account part could be saved
* Or: the default EventBus should receive *all* CloudTrail events not just ones for the current region
* EventBus Rule should be allowed to be cross-region. That would have saved me one EventBus
* EventBridge Pipes don't support SNS as a source and also it's not clear if that supports cross-region and cross-account pipesI wrote about my frustrations in this article: [https://advancedweb.hu/cloudtrails-horrible-developer-experience/](https://advancedweb.hu/cloudtrails-horrible-developer-experience/).
Overall, I'm fairly happy with this solution, but I feel that it would be so much easier if AWS supported some basic features around CloudTrail.
Originally published [on my blog](https://advancedweb.hu/shorts/how-hard-it-is-to-disable-an-iam-user-when-it-does-something-suspicious/)
-
The #EventBridge For #ActivityPub: an add-on for the WordPress #ActivityPubPlugin
"The project goal is to depict typical use cases of event organizers and emphasize their continuity in workflows on WordPress websites. Through pre-study interviews with event organizers, the #plugin is developed closely to their interests and usability and thus, allows this rather non-technical group of users to actively shape the development along their needs and interests."
https://event-federation.eu/wordpress-activitypub-event-extensions/ -
[ BLOG ] "Using AWS Application Composer to build a serviceful application"
https://it20.info/2023/02/using-aws-application-composer-to-build-a-serviceful-application/
This blog builds on a "solution" I have sketched which involves #EventBridge and #StepFunctions and show how you can use #ApplicationComposer to "stitch" it into deploy-able IaC. Nothing deep but if you are moving baby steps into Application Composer it may be worth a read.
-
An #EventBridge + #StepFunctions #nocode workflow that "changes the behavior of #ECS" and registers a single task/container public IP in a #Route53 A record.
https://github.com/aws/containers-roadmap/issues/737#issuecomment-1410169740
👺 👻
-
Moving from synchronous #apigw to fat #lambda that calls in parallel #eventbridge #dynamodb #s3 #stepfunctions #sqs #sns to fully #eda lambda that calls just #dynamodb and fan-out with #sns gave me just an 8% increase in term of scalability. #eda with #eventbridge is the same as the fatty 😭