Skip to content

Commit 7222174

Browse files
Merge pull request #311294 from mberdugo/AWSdisruption
AWS attack disruption integration - aws links - Ofer, Christos
2 parents 92641f0 + 2d0dea3 commit 7222174

1 file changed

Lines changed: 7 additions & 13 deletions

File tree

articles/sentinel/aws-disruption.md

Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,11 @@ ms.topic: how-to
1010

1111
# Enable attack disruption actions on AWS with Microsoft Sentinel (preview)
1212

13-
This article describes how to configure your AWS environment so that Microsoft Sentinel can take automated actions on a user that assumes a SAML role, or on an AWS IAM account when an alert is triggered. Attack disruption uses high-confidence signals to contain compromised assets and limit the impact of attacks, including actions on identities in AWS.
13+
This article describes how to configure your AWS environment so that Microsoft Sentinel can take automated actions on a user that assumes a SAML role, or on an AWS IAM account when an alert is triggered. Attack disruption uses high-confidence signals to contain compromised assets and limit the damage from attacks, including actions on identities in AWS.
1414

1515
## Prerequisites
1616

17-
Before you begin, ensure the following:
17+
Before you begin, you need the following prerequisites in place:
1818

1919
- You have an active AWS account with administrative privileges.
2020
- Your Microsoft Sentinel analytic workspace is connected to the unified security operations portal.
@@ -27,13 +27,11 @@ Before you begin, ensure the following:
2727

2828
### 1.1 Create a dedicated IAM role for Microsoft Sentinel
2929

30-
1. In the AWS console, go to **IAM \> Roles**.
30+
1. [Create a new IAM role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create.html) in the AWS Management Console.
3131

32-
1. Select **Create role**.
32+
- Select **AWS service** as the trusted entity and choose **EC2** (you'll update the trust relationship [next](#12-configure-trust-relationship)).
3333

34-
1. Select **AWS service** as the trusted entity and choose **EC2** (you'll update the trust relationship later).
35-
36-
1. Attach the following policy to the role (replace \<YOUR_ACCOUNT_ID\> as needed):
34+
- Attach the following policy to the role (replace \<YOUR_ACCOUNT_ID\> as needed):
3735

3836
```json
3937
{
@@ -60,15 +58,11 @@ Before you begin, ensure the following:
6058
}
6159
```
6260

63-
1. Name the role (for example, SentinelAttackDisruptionRole) and create it.
64-
6561
### 1.2 Configure trust relationship
6662

67-
1. In the IAM role you created, go to the **Trust relationships** tab.
68-
69-
1. Select **Edit trust relationship**.
63+
Create a [custom trust policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-custom.html#roles-creatingrole-custom-trust-policy-console) for the IAM role.
7064

71-
1. Replace the trust policy with the following, specifying the Microsoft Sentinel integration principal (replace `<YOUR_AZURE_SUBSCRIPTION_ID>` with your actual Azure subscription ID):
65+
Use the following trust policy, specifying the Microsoft Sentinel integration principal (replace `<YOUR_AZURE_SUBSCRIPTION_ID>` with your actual Azure subscription ID):
7266

7367
```json
7468
{

0 commit comments

Comments
 (0)