Broadcom has developed a cloud data forwarding solution to push events to your organization's existing buckets in Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). A future phase of this solution will support Kafka Topics as a delivery mechanism.
This solution will be implemented with multiple Symantec SaaS products to provide a consistent experience. Currently, Cloud Secure Web Gateway (Cloud SWG) has a preview of the Event Streaming feature, which leverages the cloud data forwarding solution. See the Cloud SWG documentation for more information:
To push events to your cloud storage buckets, you must provide the correct permissions. See the Resolution section in this article for configuration steps.
Configure accounts and credentials for the cloud storage provider and use the credentials to configure channels in your Symantec SaaS products.
Integration with AWS requires access keys for authentication.
When generating the access keys, follow the best practices for accessing AWS S3 buckets:
s3:PutObject
is required only for seamless event streaming. The Principal
defines the AWS resource such as the ARN of a user and the effect such as allowing or denying the user.To create a user and generate the keys in the AWS console:
{
"Version": "2012-10-17", //Version is restricted field, no update needed here.
"Statement": [
{"Sid": "LimitedAccessS3", //Any Unique Id can be provided.
"Principal": {"AWS":
["arn:aws:iam::123456789011:user/dummy-value" //ARN of the user created for S3 Access
]
},
"Effect": "Allow", //Whether above mentioned user should be allowed or denied
"Action": ["s3:PutObject" //List of actions to be provided here
],
"Resource": "arn:aws:s3:::(bucket-name)/*" //Replace (bucket-name) with actual bucket name
}
]
}
Integration with Azure requires access keys for authentication.
When generating the access key, use the built-in Storage Blob Data Contributor permission for least privilege.
To generate the key in the Azure console:
Note: Use an Azure built-in role with least privileges, such as Storage Blob Data Contributor, to generate the access keys.
Integration with GCP requires a service account key for authentication.
When generating the service account key, consider least-privilege principles. In GCP, create a principal with the Storage Object Creator role. This role includes read and write access for bucket objects. To provide limited access only, grant the following permissions to the role:
To generate keys in the GCP console:
Note: The GCP bucket user must have the least privileges. To do so, create a role as Storage Object Creator that has access to the GCP bucket. To provide limited access only, grant the following permissions to the role: