Adding a custom source in Security Lake
After creating the IAM role to invoke the AWS Glue crawler, follow these steps to add a custom source in Security Lake.
Keeping custom source data updated in AWS Glue
After you add a custom source in Security Lake, Security Lake creates an AWS Glue crawler. The crawler connects to your custom source, determines the data structures, and populates the AWS Glue Data Catalog with tables.
We recommend manually running the crawler to keep your custom source schema up to date and maintain query functionality in Athena and other querying services. Specifically, you should run the crawler if either of the following changes occur in your input data set for a custom source:
The data set has one or more new top-level columns.
The data set has one or more new fields in a column with a
struct
datatype.
For instructions on running a crawler, see Scheduling an AWS Glue crawler in the AWS Glue Developer Guide.
Security Lake can't delete or update existing crawlers in your account. If you delete a custom source, we recommend deleting the associated crawler if you plan to create a custom source with the same name in the future.
Supported OCSF event classes
The Open Cybersecurity Schema Framework (OCSF) event classes describes the type of data that the custom source will send to Security Lake. The list of supported event classes are:
public enum OcsfEventClass { ACCOUNT_CHANGE, API_ACTIVITY, APPLICATION_LIFECYCLE, AUTHENTICATION, AUTHORIZE_SESSION, COMPLIANCE_FINDING, DATASTORE_ACTIVITY, DEVICE_CONFIG_STATE, DEVICE_CONFIG_STATE_CHANGE, DEVICE_INVENTORY_INFO, DHCP_ACTIVITY, DNS_ACTIVITY, DETECTION_FINDING, EMAIL_ACTIVITY, EMAIL_FILE_ACTIVITY, EMAIL_URL_ACTIVITY, ENTITY_MANAGEMENT, FILE_HOSTING_ACTIVITY, FILE_SYSTEM_ACTIVITY, FTP_ACTIVITY, GROUP_MANAGEMENT, HTTP_ACTIVITY, INCIDENT_FINDING, KERNEL_ACTIVITY, KERNEL_EXTENSION, MEMORY_ACTIVITY, MODULE_ACTIVITY, NETWORK_ACTIVITY, NETWORK_FILE_ACTIVITY, NTP_ACTIVITY, PATCH_STATE, PROCESS_ACTIVITY, RDP_ACTIVITY, REGISTRY_KEY_ACTIVITY, REGISTRY_VALUE_ACTIVITY, SCHEDULED_JOB_ACTIVITY, SCAN_ACTIVITY, SECURITY_FINDING, SMB_ACTIVITY, SSH_ACTIVITY, USER_ACCESS, USER_INVENTORY, VULNERABILITY_FINDING, WEB_RESOURCE_ACCESS_ACTIVITY, WEB_RESOURCES_ACTIVITY, WINDOWS_RESOURCE_ACTIVITY, // 1.3 OCSF event classes ADMIN_GROUP_QUERY, DATA_SECURITY_FINDING, EVENT_LOG_ACTIVITY, FILE_QUERY, FILE_REMEDIATION_ACTIVITY, FOLDER_QUERY, JOB_QUERY, KERNEL_OBJECT_QUERY, MODULE_QUERY, NETWORK_CONNECTION_QUERY, NETWORK_REMEDIATION_ACTIVITY, NETWORKS_QUERY, PERIPHERAL_DEVICE_QUERY, PROCESS_QUERY, PROCESS_REMEDIATION_ACTIVITY, REMEDIATION_ACTIVITY, SERVICE_QUERY, SOFTWARE_INVENTORY_INFO, TUNNEL_ACTIVITY, USER_QUERY, USER_SESSION_QUERY, // 1.3 OCSF event classes (Win extension) PREFETCH_QUERY, REGISTRY_KEY_QUERY, REGISTRY_VALUE_QUERY, WINDOWS_SERVICE_ACTIVITY }