[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-05。"],[],[],null,["| Enterprise [service tier](/security-command-center/docs/service-tiers)\n\nThe Security Command Center curated detections, threat investigation, and\nCloud Infrastructure Entitlement Management (CIEM) capabilities for Amazon Web Services\n(AWS) require the ingestion of AWS logs using the Google SecOps\ningestion pipeline. The AWS log types required for ingestion differ based on\nwhat you are configuring:\n\n- CIEM requires data from the AWS CloudTrail log type.\n- Curated detections require data from multiple AWS log types.\n\nTo learn more about the different AWS log types, see [Supported devices and log\ntypes](/chronicle/docs/detection/cloud-threats-category#aws-log-types).\n\nConfigure AWS log ingestion for CIEM\n\nTo generate findings for your AWS environment, the Cloud Infrastructure Entitlement Management (CIEM)\ncapabilities require data from AWS CloudTrail logs.\n\nTo use CIEM, do the following when configuring AWS log ingestion.\n\n1. When setting up your AWS CloudTrail, complete the following configuration\n steps:\n\n 1. Create one of the following:\n\n - An organization-level trail that pulls log data from across all AWS accounts.\n - An account-level trail that pulls log data from select AWS accounts.\n\n | **Note:** For an account-level trail, Security Command Center won't be able to detect all lateral movement risks.\n 2. Set the Amazon S3 bucket or Amazon SQS queue you choose for CIEM\n to log **management events** from *all regions*.\n\n2. When setting up a feed to ingest AWS logs using the Security Operations console\n **Feeds** page, complete the following configuration steps:\n\n 1. Create a feed that ingests all account logs from the Amazon S3 bucket or Amazon SQS queue for *all regions*.\n 2. Set the feed **Ingestion labels** key-value pair based on the feed source\n type, using one of the following options:\n\n - If the **Source type** is **Amazon S3**, configure one of the following:\n\n - To extract data every 15 minutes, set the **Label** to `CIEM` and the **Value** to `TRUE`. You can reuse this feed for other Security Command Center services where a 15-minute data latency is acceptable.\n - To extract data every 12 hours, set the **Label** to `CIEM_EXCLUSIVE` and the **Value** to `TRUE`. This option works for CIEM and other potential Security Command Center services where a 24-hour data latency is acceptable.\n - If the **Source type** is **Amazon SQS** , set the **Label** to `CIEM`\n and the **Value** to `TRUE`.\n\nIf you don't configure log ingestion correctly, the CIEM\ndetection service might display incorrect findings. In addition, if there are\nissues with your CloudTrail configuration, Security Command Center displays the\n[`CIEM AWS CloudTrail configuration error`](/security-command-center/docs/how-to-remediate-scc-errors#ciem-cloudtrail-troubleshoot).\n\nTo configure log ingestion, see [Ingest AWS logs into Google Security Operations](/chronicle/docs/ingestion/ingest-aws-logs-into-chronicle)\nin the Google SecOps documentation.\n\nFor full instructions on enabling CIEM, see\n[Enable the CIEM detection service for AWS](/security-command-center/docs/ciem-enable-service).\nFor more information about CIEM features, see\n[Overview of Cloud Infrastructure Entitlement Management](/security-command-center/docs/ciem-overview).\n\nConfigure AWS log ingestion for curated detections\n\nCurated detections available with Security Command Center Enterprise help identify\nthreats in AWS environments using both event and context data.\n\nEach [AWS rule set](/chronicle/docs/detection/cloud-threats-category#aws-rule-sets)\nrequires certain data to function as designed, including one or more of the\nfollowing sources:\n\n- AWS CloudTrail\n- AWS GuardDuty\n- AWS context data about hosts, services, and VPCs.\n- AWS Identity and Access Management\n\nTo use these curated detections, you must ingest AWS log data to the Google SecOps tenant, and then enable the curated detection rules.\n\nFor more information, see the following in the Google SecOps\ndocumentation:\n\n- [Supported devices and log types for AWS](/chronicle/docs/detection/cloud-threats-category#aws-log-types): information about data required by\n the AWS rule sets.\n\n- [Ingest AWS logs into Google Security Operations](/chronicle/docs/ingestion/ingest-aws-logs-into-chronicle): steps to collect AWS CloudTrail logs.\n\n- [Curated detections for AWS data](/chronicle/docs/detection/cloud-threats-category#aws-rule-sets): summary of the AWS rule sets in the\n Cloud Threats curated detections.\n\n- [Use curated detections to identify threats](/chronicle/docs/detection/use-curated-detections): how to use curated detections in\n Google SecOps.\n\nSee [Google Cloud service tiers](/security-command-center/docs/service-tiers#aws-logs)\nfor information about the type of log data that customers with Security Command Center\nEnterprise can ingest to the Google SecOps tenant."]]