Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

documentation modules #31

Merged
merged 1 commit into from
Jun 5, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions guide/content/_index.md
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
---
weight: 1
title: <Project Name>
description: <Project Description>
title: CrowdStrike Falcon Horizon
description: CrowdStrike Falcon Horizon monitors your AWS cloud services to detect critical security issues, common configuration errors, and patterns of suspicious behavior.
---

# Project Title
# CrowdStrike Falcon Horizon

The purpose of this document is to walk you through the process of <fill-it-up> . This document is intended for Customers who are using the <project-name> AWS Built In program(ABI) and in process of building an ABI project.
The purpose of this document is to walk you through the process of onboarding your AWS Organization with CrowdStrike Falcon Horizon. This document is intended for Customers who are using the CrowdStrike Falcon Horizon AWS Built In program(ABI) and in process of building an ABI project.

The AWS Built-in program is a differentiation program that validates Partner solutions which have automated their solution integrations with relevant AWS foundational services like identity, management, security and operations. This program helps customers find and deploy a validated Partner solution that addresses specific customer use cases while providing deep visibility and control of AWS native service integration.

Expand Down
10 changes: 6 additions & 4 deletions guide/content/additional-resources.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,13 +6,15 @@ description: Additional Resources

## Partner documentation

* Reference-1
* Reference-2
* In CrowdStrike Falcon Console, navigate to Documentation/Falcon Horizon Overview

## AWS Services

* Reference-1
* Reference-2
* [CloudFormation StackSets](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/what-is-cfnstacksets.html)
* [Lambda](https://docs.aws.amazon.com/lambda/latest/dg/welcome.html)
* [IAM Roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html)
* [EventBridge](https://docs.aws.amazon.com/eventbridge/latest/userguide/eb-what-is.html)
* [Secrets Manager](https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html)

## Frequently asked questions (FAQs)

Expand Down
25 changes: 19 additions & 6 deletions guide/content/architecture.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,17 +10,30 @@ Deploying this ABI package with default parameters builds the following architec

As shown in the diagram, the Quick Start sets up the following:

* In all current and AWS accounts in your AWS organization:
* <Amazon CloudWatch Events rules> to <detect changes in AWS Config configuration items (CIs)> and <trigger AWS Lambda functions>.
* <Service> to perform <Action-1> and <Action-2>.
* In all current and AWS accounts in your AWS organization:
* IAM Role for Horizon to perform Read-Only activities.
* IAM Role too allow EventBridge to PutEvents against CrowdStrike's EventBus.
* EventBridge Rules in each region with CrowdStrike EventBus as target.

* In the management account:
* <Service> to perform <Action-1> and <Action-2>.
* Secrets Manager Secret to store CrowdStrike API Keys.
* IAM Role for Horizon to perform Read-Only activities.
* IAM Role for EventBridge to PutEvents against CrowdStrike's EventBus.
* IAM Role for Lambda Execution.
* Lambda function to perform account registration with CrowdStrike.
* Custom CloudFormation Resource to trigger Lambda Function.
* CloudFormation StackSet to create EventBridge Rules in each region.
* CloudFormation StackSet to create IAM Roles in member accounts.
* CloudFormation StackSet to create EventBridge Rules in member accounts.

* In the log archive account:
* <Service> to perform <Action-1> and <Action-2>.
* IAM Role for Horizon to perform Read-Only activities.
* IAM Role to allow EventBridge to PutEvents against CrowdStrike's EventBus.
* EventBridge Rules in each region with CrowdStrike EventBus as target.

* In the security tooling account:
* <Service> to perform <Action-1> and <Action-2>.
* IAM Role for Horizon to perform Read-Only activities.
* IAM Role to allow EventBridge to PutEvents against CrowdStrike's EventBus.
* EventBridge Rules in each region with CrowdStrike EventBus as target.

**Next:** Choose [Deployment Options](/deployment-options/index.html) to get started.
4 changes: 2 additions & 2 deletions guide/content/costandlicenses.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,13 +4,13 @@ title: Cost and licenses
description: Cost of the solution and licenses required.
---

<partner cost>
[CrowdStrike Bundles and Pricing](https://www.crowdstrike.com/products/?ct-q2-2023-bn-products-nav)

<AWS Service cost>

<Any other costs>

<Partner license>
[CrowdStrike End User License Agreement](https://s3.amazonaws.com/EULA/314ae52f-b319-4413-9052-fe03bfbd6b21-Crowdstrike-EULA.pdf)

<ABI license>

Expand Down
4 changes: 2 additions & 2 deletions guide/content/deployment-steps.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,9 +10,9 @@ description: Deployment steps

1. Download the cloudformation template from source: https://<abi-template-location>
2. Launch CloudFormation template in your AWS Control Tower home region.
* Stack name: `template-<partner-name>-enable-integrations`
* Stack name: `template-crowdstrike-enable-integrations`
* List Parameters with [call out default values and update below example as needed]
* **EnableIntegrationsStackName**: `template-<partner-name>-enable-integrations`
* **EnableIntegrationsStackName**: `template-crowdstrike-enable-integrations`
* **EnableIntegrationsStackRegion**: `us-east-1`
* **EnableIntegrationsStackSetAdminRoleName**: `AWSCloudFormationStackSetAdministrationRole`
* **EnableIntegrationsStackSetExecutionRoleName**: `AWSCloudFormationStackSetExecutionRole`
Expand Down
12 changes: 12 additions & 0 deletions guide/content/faqs.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,18 @@ title: FAQs
description: Frequently asked questions
---

## How frequently will CrowdStrike Horizon scan my environment for Configuration (IOM) assessment?

You may configure your settings to determine how often the assessments will occur. The default rate is 2 hours after the last successfull assessment. Optional intervals: 6 hours, 12 hours and 24 hours

## How frequently will CrowdStrike Horizon scan my environment for Behavioral (IOA) assessment?

IOA findings are not generated by scheduled scans, but instead are forwarded to CrowdStrike at the time of the event via EventBridge. This means IOA findings will appear in your Falcon Horizon console in near-real time.

## Can I create custom policies with CrowdStrike Falcon Horizon?

You can create custom policies for misconfiguration detections in your cloud accounts in Horizon. By defining your own rules, you get more coverage with fine-tuned policies that meet your own security and compliance requirements.

## Can I contribute to this repository?

Yes, this shared under Apache License, version 2.0 (the "License"). Please submit a GitHub issue if you see an issues or improvements. If you like to build and contribute a fix or enhancement, please submit a GitHub pull request with your changes.
Expand Down
7 changes: 4 additions & 3 deletions guide/content/overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,15 +5,16 @@ description:
---


This ABI deploys <Partner project name> Integrations for AWS Organizations on the AWS Cloud. It’s for <persona-1> and <persona-2> that want to provide <partner-product-functionality> across multiple AWS accounts. If you are unfamiliar with AWS Built In, refer to the [AWS Built in](https://aws.amazon.com/builtin).
This ABI deploys CrowdStrike Falcon Horizon Integrations for AWS Organizations on the AWS Cloud. It’s for <persona-1> and <persona-2> that want to provide Cloud Security Posture Management across multiple AWS accounts. If you are unfamiliar with AWS Built In, refer to the [AWS Built in](https://aws.amazon.com/builtin).

Deploying this ABI package does not guarantee an organization’s compliance with any laws, certifications, policies, or other regulations.

Avoid breaches and make sure your cloud security configuration meets industry security recommendations with the CrowdStrike Cloud Security Posture Management platform, Falcon Horizon. Falcon Horizon monitors your AWS, Azure, and GCP cloud services to detect critical security issues, common configuration errors, and patterns of suspicious behavior. Use Horizon to triage findings and find recommended remediations to close the gaps and keep your cloud data secure.

[Expand solution overview here]
The first step in getting started using Falcon Horizon, is to register your cloud accounts with Falcon Horizon. When registering, Falcon Horizon is granted limited read-only access to your cloud account. When you register using this solution, all accounts in that organization are registered automatically for Falcon Horizon.

### AWS Marketplace listing

[Partner-product-name-in-aws-marketplace](https://aws.amazon.com/marketplace/pp/prodview-<marketplace-id>)
[PCrowdStrike Falcon Cloud Security](https://aws.amazon.com/marketplace/pp/prodview-l6ti2ml2i2g6y?ref_=esp&feature_=FeaturedProducts)

**Next:** Choose [Terminologies](/terminologies/index.html) to get started.
9 changes: 5 additions & 4 deletions guide/content/post-deployment-steps.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,10 @@ description: Post deployment options

## Verifying the solution functionality

## Parnter capability 1

## Parnter capability 2

## Verify Account Activation in CrowdStrike Falcon Console
* Sign in to your CrowdStrike Falcon Console
* Navigate to Cloud-Security/Registration https://falcon.crowdstrike.com/cloud-security/registration
* Verify each AWS Account ID shows "Active" in the Configuration (IOM) and Behavior (IOA) columns.
* This step may take several minutes, click refresh to retireve the latest account status.

**Next:** Choose [Test the Deployment](/test-deployment/index.html) to get started.
3 changes: 1 addition & 2 deletions guide/content/pre-deployment-steps.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,8 +7,7 @@ description: Pre Deployment Options
Before deploying this ABI package, complete the following steps:

* Subscribe to partner product from AWS Marketplace using <AWS Marketplace Listing>
* Any things to be done before deployment
* Any other pre-deployment steps
* Create Crowdstrike API Client in Falcon UI with CSPM registration API scope.
* Become familiar with the [additional resources](https://link), later in this guide.

**Next:** Choose **[Deployment Steps](/deployment-steps/index.html)** to get started.
11 changes: 10 additions & 1 deletion guide/content/terminologies.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,15 @@ description: Terminolgies used in this guide.
* **ABI :** AWS Built In (ABI) as explained above.
* **ABI Modules :** The GitHub repositories based of AWS SRA, which provide templates for enabling AWS foundational services like CloudTrail, GuardDuty, SecurityHub and more security services.
* **ABI Projects :** The GitHub repositories built by Partners in partnership with AWS. While building these projects, partners leverage ABI Modules provided to enable AWS services as needed before creating partner specific assets. The project contains 1\ IaC templates to automate enablement of both AWS and Partner services, 2\ Wrappers for most common formats like CfCT manifest, SC Baselines and more to allow customers to easily pick and choose from the services available. For Pilot, we will focus only on including CfCT manifest file in the package.
* [[Add more terminologies here]]
* **Assessment:** An individual instance when Horizon compares your cloud settings to the Horizon policies.
* **Assessment Schedules:** You can select how frequently your cloud environment is assessed for misconfigurations. You can also exclude AWS services and regions from assessment.
* **Behavioral:** Patterns of suspicious behavior in your cloud environment.
* **Configuration:** Findings based on policies and benchmarks compared to your cloud configuration.
* **CrowdStrike API Client:** CrowdStrike Falcon API Client authentication credentials for interaction with CrowdStike APIs via OAuth 2.0 token. Includes an API Client ID and API Client Secret.
* **CrowdStrike EventBus:** The AWS EventBus in CrowdStrike's environment to receive events and provide the data to CrowdStrike Falcon Horizon service.
* **Horizon Policies:** Horizon policies are a set of rules defined to detect misconfigurations of the cloud resources (IOMs) or to detect suspicious behavior patterns (IOAs).
* **Indicator of attack (IOA):** A pattern of suspicious behavior that suggests an attack might be underway. In Horizon, IOAs are labeled as findings.
* **Indicator of misconfiguration (IOM):** A configuration setting that doesn’t follow recommended security guidelines and might become a security vulnerability in a cloud environment. In Horizon, IOMs are labeled as findings.
* **Registration:** Enroll your AWS Account ID with CrowdStrike Falcon Horizon service.

**Next:** Choose [Cost and licenses](/costandlicenses/index.html) to get started.
16 changes: 14 additions & 2 deletions guide/content/test-deployment.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,23 @@ title: Test the deployment
description: Test the deployment
---

## Step-1
To test the functionality of CrowdStrike Falcon Horizon, you may generate findings by intentionally violating a policy of your choice.
**Note:** CrowdStrike does not recommend executing these steps against any accounts and/or workloads with sensitive data.

## Step-2
## Step-1: Review Policies
* Log in to the CrowdStrike Falcon console
* Navigate to Cloud Security/Cloud Security Posture/Policies
* Filter by AWS and choose a service
* Review Configuration and Behavioral policies.

## Step-2: Execute Policy Violation
* Choose a policy to test, for example "VPC Flow Logs Disabled"
* Make the relevant change in your AWS account

## Step-3
* Review your Horizon Assessment findings in Cloud Security/Cloud Security Posture/Assessment
* If the policy you chose is Behavioral, please wait a few minutes for the finding to appear.
* If the policy you chose is Configuration, please wait for the next assessment scan for the finding to appear. 2 hours is the default interval, but this may be changed in Cloud Security/Cloud Security Posture/Settings


**Next:** Choose [Additonal Resources](/additional-resources/index.html) to get started.
2 changes: 2 additions & 0 deletions guide/content/troubleshooting.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,8 @@ title: Troubleshooting
description: Troubleshooting
---

For troubleshooting issues with CrowdStrike Falcon Horizon please [submit a support ticket here.](https://supportportal.crowdstrike.com/)

For troubleshooting common ABI issues, refer to the [AWS Built In General Information Guide](http://link-to-reference-architecture) and [Troubleshooting CloudFormation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/troubleshooting.html).


Expand Down