Collect Azion firewall logs

Supported in:

Overview

This parser extracts fields from Azion firewall JSON logs, performs data type conversions and enrichment (for example, user-agent parsing), and maps the extracted fields to the UDM. It generates NETWORK_HTTP, SCAN_UNCATEGORIZED, or GENERIC_EVENT events based on the presence of principal and target machines. It also handles WAF-related fields and actions, mapping them to UDM security result fields.

Before you begin

  • Ensure that you have a Google SecOps instance.
  • Ensure that you have privileged access to AWS IAM and S3.
  • Ensure that you have privileged access to an active Azion account.

Configure Amazon S3 bucket

  1. Create Amazon S3 bucket following this user guide: Creating a bucket.
  2. Save bucket Name and Region for future reference.
  3. Create a User following this user guide: Creating an IAM user.
  4. Select the created User.
  5. Select Security credentials tab.
  6. Click Create Access Key in section Access Keys.
  7. Select Third-party service as Use case.
  8. Click Next.
  9. Optional: Add description tag.
  10. Click Create access key.
  11. Click Download .csv file. (Save Access Key and Secret Access Key for future reference).
  12. Click Done.
  13. Select Permissions tab.
  14. Click Add permissions in section Permissions policies.
  15. Select Add permissions.
  16. Select Attach policies directly.
  17. Search for AmazonS3FullAccess policy.
  18. Select the policy.
  19. Click Next.
  20. Click Add permissions.

Configure Azion for continuous log delivery to Amazon S3

  1. In the Azion console, go to to the DataStream section.
  2. Click + Stream.
  3. Specify values for the following parameters:
    • Name: Provide a unique and descriptive name to identify the data stream.
    • Source: Select the source to collect the data from.
    • Template: A preset of variables for specific sources or an open template to choose variables. You have the option to filter domains.
  4. In Destination section, click Connector > Simple Storage Service (S3).
    • URL: the bucket URI. s3:/BUCKET_NAME. Replace the following:
      • BUCKET_NAME: the name of the bucket.
    • Bucket Name: Name of the bucket to which the object will be sent.
    • Region: Region where your bucket is located.
    • Access Key: User access key with access to the s3 bucket.
    • Secret Key: User secret key with access to the s3 bucket.
    • Content Type: Select plain/text.
  5. Click Save.

For more information, see How to use Amazon S3 to receive data from Data Stream

Configure a feed in Google SecOps to ingest the Azion logs

  1. Go to SIEM Settings > Feeds.
  2. Click Add new.
  3. In the Feed name field, enter a name for the feed (for example, Azion Logs).
  4. Select Amazon S3 as the Source type.
  5. Select Azion as the Log type.
  6. Click Next.
  7. Specify values for the following input parameters:
    • Region: the region where the Amazon S3 bucket is located.
    • S3 URI: the bucket URI. s3:/BUCKET_NAME. Replace the following:
      • BUCKET_NAME: the name of the bucket.
    • URI is a: select the URI type according to log stream configuration (Single file | Directory | Directory which includes subdirectories).
    • Source deletion options: select deletion option according to your preference.
  • Access Key ID: the User access key with access to the s3 bucket.
  • Secret Access Key: the User secret key with access to the s3 bucket.
  • Asset namespace: the asset namespace.
  • Ingestion labels: the label to be applied to the events from this feed.
  • Click Next.
  • Review your new feed configuration in the Finalize screen, and then click Submit.

UDM Mapping Table

Log Field UDM Mapping Logic
asn read_only_udm.network.asn Directly mapped from the asn field.
bytes_sent read_only_udm.network.sent_bytes Directly mapped from the bytes_sent field, converted to unsigned integer.
country read_only_udm.principal.location.country_or_region Directly mapped from the country field.
host read_only_udm.principal.hostname Directly mapped from the host field.
http_referer read_only_udm.network.http.referral_url Directly mapped from the http_referer field.
http_user_agent read_only_udm.network.http.user_agent Directly mapped from the http_user_agent field.
http_user_agent read_only_udm.network.http.parsed_user_agent Parsed from the http_user_agent field using the parseduseragent filter.
read_only_udm.event_type Determined by the parser based on the presence of principal and target information. Can be NETWORK_HTTP, SCAN_UNCATEGORIZED, or GENERIC_EVENT.
read_only_udm.metadata.product_name Hardcoded to "AZION".
read_only_udm.metadata.vendor_name Hardcoded to "AZION".
read_only_udm.metadata.product_version Hardcoded to "AZION".
remote_addr read_only_udm.principal.ip Directly mapped from the remote_addr field.
remote_port read_only_udm.principal.port Directly mapped from the remote_port field, converted to integer.
requestPath read_only_udm.target.url Directly mapped from the requestPath field if request_uri is not present.
request_method read_only_udm.network.http.method Directly mapped from the request_method field, converted to uppercase.
request_time read_only_udm.additional.fields Added as a key-value pair to the additional.fields array, with key "request_time" and value from the request_time field.
request_uri read_only_udm.target.url Directly mapped from the request_uri field if present.
server_addr read_only_udm.target.ip Directly mapped from the server_addr field.
server_port read_only_udm.target.port Directly mapped from the server_port field, converted to integer.
ssl_cipher read_only_udm.network.tls.cipher Directly mapped from the ssl_cipher field.
ssl_protocol read_only_udm.network.tls.version_protocol Directly mapped from the ssl_protocol field.
ssl_server_name read_only_udm.network.tls.client.server_name Directly mapped from the ssl_server_name field.
state read_only_udm.principal.location.state Directly mapped from the state field.
status read_only_udm.network.http.response_code Directly mapped from the status field, converted to integer.
time read_only_udm.metadata.event_timestamp Parsed from the time field using date filter and multiple date formats.
upstream_addr read_only_udm.intermediary.ip, read_only_udm.intermediary.port Extracted from the upstream_addr field using grok, splitting into IP and port.
upstream_status read_only_udm.additional.fields Added as a key-value pair to the additional.fields array, with key "upstream_status" and value from the upstream_status field.
waf_args read_only_udm.security_result.detection_fields Added as a key-value pair to the security_result.detection_fields array.
waf_attack_action read_only_udm.security_result.detection_fields Added as a key-value pair to the security_result.detection_fields array.
waf_attack_family read_only_udm.security_result.detection_fields Added as a key-value pair to the security_result.detection_fields array.
waf_headers read_only_udm.security_result.detection_fields Added as a key-value pair to the security_result.detection_fields array.
waf_learning read_only_udm.security_result.detection_fields Added as a key-value pair to the security_result.detection_fields array.
waf_match read_only_udm.security_result.detection_fields Added as a key-value pair to the security_result.detection_fields array.
waf_score read_only_udm.security_result.detection_fields Added as a key-value pair to the security_result.detection_fields array.
waf_server read_only_udm.security_result.detection_fields Added as a key-value pair to the security_result.detection_fields array.
waf_total_blocked read_only_udm.security_result.detection_fields Added as a key-value pair to the security_result.detection_fields array.
waf_total_processed read_only_udm.security_result.detection_fields Added as a key-value pair to the security_result.detection_fields array.
waf_uri read_only_udm.security_result.detection_fields Added as a key-value pair to the security_result.detection_fields array.
read_only_udm.security_result.action Determined by the parser based on the waf_block or blocked fields. Set to ALLOW or BLOCK.

Changes

2023-09-30

  • Newly created parser.