AWS CloudFront Log Monitoring

Integration Overview

AWS CloudFront is a content delivery network (CDN) service that delivers data, videos, applications, and APIs to users globally with low latency and high transfer speeds. Panther can collect, normalize, and monitor events from your CDN to help you identify suspicious activity in real-time. Your normalized data is retained for future security investigations in a data lake powered by Snowflake.

Use Cases for CloudFront Logs

AWS CloudFront access logs provide detailed information about each request made by a client and handled by the CloudFront CDN. These logs include data on accessed files, the responses from your distribution, client browser details, client IP addresses, and more. Common SIEM use cases for CloudFront logs include:

  • Monitoring user behavior to identify patterns of suspicious activity.
  • Detecting bot traffic or identifying anomalies in request patterns.
  • Tracking activity that could indicate potential DDoS attacks.

Onboarding CloudFront Logs in Panther

Panther’s integration for CloudFront is straightforward to set up. Simply configure your CloudFront access logs to be delivered to an S3 bucket and provide the bucket details in Panther’s log source creation wizard. Once configured, Panther will automatically and continuously ingest logs from the S3 bucket, enabling you to onboard your CloudFront data in just a few minutes.

For more details on onboarding CloudFront logs or for supported log schema, you can view our CloudFront documentation here.

Normalizing & Analyzing CloudFront Events

As Panther ingests events, they are parsed, normalized, and stored in a Snowflake security data lake. This empowers security teams to craft detections, identify anomalies, and conduct investigations on your data in the context of days, weeks, or months.

Panther’s managed schema will apply normalization fields to your CloudFront events, standardizing attribute names and empowering users to correlate and investigate data across all log types. For more on searching log data in Panther, check out our documentation on Investigations & Search.

Detection as Code

With Panther, your team won’t be confined to restrictive detection rules as seen in many SIEM platforms. Panther is built with detection-as-code principles, allowing users to use Python to write expressive detections and integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team. In addition, you can create correlation rules to link multiple events together, like IDP logs and CloudFront logs, for highly targeted alerts.

Configuring Alerts

Panther fires alerts when your detection rules or policies are triggered and integrates with a variety of alert destinations to allow for easy access and management of any CloudFront alerts. Alerts can also be forwarded to alert context or SOAR platforms for more remediation options.

Alerts are categorized into five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the option to dynamically assign severity based on specific log event attributes.

Customer Support

If you have any questions about configuring CloudFront with Panther, we’re here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.

You can check out our documentation on configuring CloudFront here, or customers can sign up for the Panther Community to share best practices or custom detections for CloudFront.

The Ideal SIEM Integration for CloudFront

With Panther, security teams don’t have to struggle with restrictive detection logic, waste time and resources on operational overhead, or pay skyrocketing costs to keep up with the growth of cloud data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges firsthand and built an intuitive, cloud-native platform to solve them.

Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today’s security teams. For a powerful, flexible, and scalable SIEM solution, request a demo today.

Escape Cloud Noise. Detect Security Signal.
Request a Demo