Description


Integrating MPmail Avanan with AWS S3 for Splunk logs


Requirements


  • An admin login to Amazon AWS
  • An admin login to the MPmail Avanan tenancy


The Process


  1. Go to AWS IAM: https://console.aws.amazon.com/iam/home#/home 
  2. Click on Users > Add user
  3. Select a name and enable “Programmatic access”, click “Next: Permissions”
  4. Click on “Create group” (or the right group if already created)
  5. Click on “Create policy” (or select the right policy if already created)
  6. On the new tab, click on JSON and copy this over: 

    {
    "Version": "2012-10-17",
    "Statement": [
    {
    "Effect": "Allow",
    "Action": [
    "s3:ListBucket"
    ],
    "Resource": [
    "arn:aws:s3:::YOUR_S3_BUCKET"
    ]
    },
    {
    "Effect": "Allow",
    "Action": [
    "s3:GetObject",
    "s3:GetObjectAcl",
    "s3:PutObject"
    ],
    "Resource": [
    "arn:aws:s3:::YOUR_S3_BUCKET/THE_LOG_FOLDER_IF_ANY/*"
    ]
    }
    ]
    }



  7. Click on Review Policy
    Select the policy you just created, give the group a name and click on “Create group”


  8. After the policy is created, go back to the previous tab and click “Refresh”
    On the next screen, select a policy name and click on “Create Policy”

  9. Back to the “Add user” screen, confirm that the group you just created is selected and click on “Next: Tags”


  10. Add the necessary Tags (in accordance with your environment directives) and click on “Next: Review”
    Confirm all the configurations and click on “Create user”

  11. Click on Roles and on “Create role”
    Select Another AWS Account
    Insert the 12 digit number of the user you just created click on “Next: Permissions”


    Note: to find the 12 digit number, open the user on another screen:

  12. Select the policy you created, click on Next: Tags


  13. Add the necessary Tags (in accordance with your environment directives) and click on Next: Review

  14. Select a role name and click on Create Role

  15. Search for the role you just created, click on its name
  16. Select “Trust relationships” and click on “Edit trust relationship”

  17. Copy the following over and click on “Update Trust Policy”


    {
    "Version": "2012-10-17",
    "Statement": [
    {
    "Effect": "Allow",
    "Principal": {
    "AWS": "arn:aws:iam::731485868276:user/avanan-s3-log-uploader"
    },
    "Action": "sts:AssumeRole",
    "Condition": {
    "StringEquals": {
    "sts:ExternalId": "avanan-s3-logs"
    }
    }
    }
    ]
    }

  18. Copy the Role ARN to use on the Avanan side

  19. Back on Avanan, go to Configuration > Security App Store
    Find Splunk on the list and click on Configure (if the button is grey out, the module is not enabled, click on the round “PLAY” button to enable it and refresh the page)

  20. Copy your Role ARN, bucket name, and select a region. Insert the subfolder you want the logs to be uploaded to, if any (they will be uploaded to the root directory if left empty).
    Select “Report security events to Splunk” if you want all new security events to be uploaded (recommended).
    Select “Include entity profile link” if you want to add a link to the entity profile on Avanan to the JSON logs.
    Click on “Ok” to save. The Avanan-S3 side of the integration is done.