Thứ Hai, 29 tháng 1, 2018

Auto news on Youtube Jan 29 2018

For Oracle Cloud Access Security Broker Cloud Service to monitor your Amazon Web

Services account there are two services that must be enabled. CloudTrail and S3.

Enabling these services allows your Identity and Access Management account

to read the AWS service itself. It also enables the account to read the CloudTrail logs

in your s3 bucket. First log into your AWS console to enable CloudTrail

and check the policy settings on your S3 bucket

Start by selecting Services from the menu

Under management tools, choose CloudTrail

You'll see an AWS CloudTrail screen. Once selected, you're taken to the CloudTrail service

Here you give the service a name of your choice. Notice, by default it's enabled

for all regions and is capturing all events. Choose whether to put your CloudTrail logs

into an existing S3 bucket or a new one. For an existing S3 bucket

select No. Then, enter the name of the S3 bucket. If you want to use a log file

prefix to change the default location of the CloudTrail logs, enter the prefix

under advanced. Instead of storing logs in Amazon S3/bucket name/AWS logs/account number,

it will insert the prefix after the bucket name. To create a new S3 bucket

Select Yes. Give the bucket a name and choose Create to create the

cloud trail and the S3 bucket. This will take you to the CloudTrail service.

This is the screen you would see if you already had CloudTrail enabled and

selected Trails in the left hand menu.

You'll see the Cloud Trail you just created

and the name of the S3 bucket its piping its logs to. Choosing the CloudTrail name

will take you into the configurations page, where you can

validate the settings of the CloudTrail. Here, you can edit the configurations

disable CloudTrail or delete it.

The next step is to validate the policy on the S3 bucket. Select Services from

the menu and under storage select S3

Select the bucket name and you'll see four tabs across the top

By choosing Permissions you get to the Bucket policy. Under bucket policy, you'll

see the policy in JSON format that was automatically created by the CloudTrail

service on your S3 bucket. If you use an existing S3 bucket, ensure that the

policy has the GetBucketACL for CloudTrail policy and s3:PutObjects

for CloudTrail policy included. Reading the policy you'll see that it entitles

the CloudTrail service to get to the bucket access control list. But more

importantly puts objects into the bucket. These permissions allow CloudTrail to

store the log data it generates into your S3 service.

Congratulations! you've enabled CloudTrail.

CloudTrail is piping its logs to an S3 bucket on your Amazon Web Services account.

Thank you for watching.

For more infomation >> Oracle CASB Cloud Service: Enabling Cloudtrail and S3 - Duration: 3:22.

-------------------------------------------

Human Resources Plan for 2016–2019: Guaranteeing the delivery of public services - Duration: 0:57.

I think Psychology was a career

that attracted me because it was a way to help,

to be in contact with people, which is what I really like.

I especially remember a 16-year-old boy

who was in hospital in a very serious condition

and the mother was there when we arrived.

She was in that situation, with her son there being treated.

We went outside for some fresh air.

To breath a little bit and forget about the ICU.

At that moment, she told me: "Can you hug me?"

And the feeling of saying: "Yes." It's not that difficult what she asks.

We are people.

We are civil servants, but we are people working for people.

Sergeant of the Research and Accident Prevention Unit. Traffic and Road Safety Division Guàrdia Urbana.

Guaranteeing the provision of public services

For more infomation >> Human Resources Plan for 2016–2019: Guaranteeing the delivery of public services - Duration: 0:57.

-------------------------------------------

Human Resources Plan for 2016–2019: Strengthening the capacity of public services - Duration: 1:00.

I like Excel.

When I open it and I see the grid, I say: "That's a good start."

You like controlling your home economy because it's yours.

But it's not the same a 25 euro ticket

than a 25,000 euro invoice, a thousand times more,

like the ones we have during the city's festival.

We work with an important budget. It's a council, a powerful district.

Keeping control of a powerful thing

is something that amuses me and I like it.

You need empathy to put yourself in somebody else's shoes.

You need to understand the circumstances.

We work as a team.

Like they say: if you want to go further, you need a team.

Management Control People and Territory Services Management Sant Martí District

Reinforcing the capacity of public services

For more infomation >> Human Resources Plan for 2016–2019: Strengthening the capacity of public services - Duration: 1:00.

-------------------------------------------

Oracle CASB Cloud Service: Turn on Cross Account Logging in AWS - Duration: 8:10.

Cross-account logging is a configuration in Amazon Web Services that allows users

to pipe CloudTrail log data from one account to another account's S3 bucket

There are many reasons why you'd want to set up centralized logging in your environment

From an information security perspective, you may want to limit access

to the logs from the users who created them. In this walk-through you'll set up

cross-account logging between two AWS accounts and create a cross-account role

In this example, the name of the account thats sending the logs will be called source

and the account that's receiving the CloudTrail logs into its S3 bucket will be called target.

At this point in the configuration it's assumed that the

CloudTrail and the S3 bucket on the target account are already enabled

Let's first configure the AWS target account. For this, start two different browsers.

This is required because AWS sessions cannot overlap.

So you cannot navigate between two AWS accounts in the same browser even on multiple tabs

Here we are using Chrome for the target account and Firefox for the source account

In browser one, open the AWS management console for the target account, the one that receives Cloud trail logs

In browser two, open the AWS management console for the source account

This is the account that sends its cloud trail logs to the target account

Let's start with the target account

This account is configured first because the policy on the S3 bucket must be modified to allow

the source account to write to it. When you create the CloudTrail in a source

account, you'll have to name the S3 bucket. Unless the policy has been

modified the Cloud trail creation process in the source account will not

recognize this S3 bucket in the target account and will therefore fail

The target account's S3 bucket will need to have a policy statement to allow the

source account CloudTrail service to put its log data into it

From Services in the target account navigate to Storage and select S3

When you select the bucket navigate to Permissions

and then Bucket Policy.

Here you'll see the policy. Make a copy of this existing

policy in case you need to revert to a working copy of the policy later

Look for the policy statement in the action of s3:PutObject. Below that you'll see a

resource statement with the target accounts account number.

You'll need to add an additional resource statement to include the source account number

Save it and if there are any syntax errors AWS will state that the policy contains invalid JSON

If this happens, try and find the error

or cancel your changes and restart or revert to the original policy you copied earlier

For every other AWS account, you'll repeat this process of copying

and pasting additional ARN statements and updating the account number

Save after each one to ensure that no syntax errors exist

Now that the target accounts S3 bucket has the correct policy statement to allow the source

account to send the CloudTrail logs, a cross-account role needs to be created

for the target account. Oracle CASB Cloud Service relies on each AWS account

to be able to read its own CloudTrail logs. To do this each source account must

assume the cross-account role to receive the correct entitlements to read the S3 bucket

Navigate back to Services and under Security Identity and Compliance select IAM.

From Roles create a new role and select Another AWS Account

This allows IAM users or roles you own to assume this cross-account role

Assuming the cross-account role grants the appropriate entitlements to the IAM user or role

in order to read the S3 bucket. Enter the source accounts account number

Then navigate to the next screen from where you can assign the permissions

Select the s3 read-only access policy

Give the role a name and then create it

Select the role you just created in Roles. Open the Trust Relationship screen.

This is the control that AWS uses to ensure only recognized source account

users and roles can assume this role on the target account.

Now edit the trust relationship

You can see that the principal is set for the source account

and the access is root. To adhear to the information security policy of

least privileged access, you'll want to change this to the ARN of the IAM role in the

source account that will be used to monitor the source AWS account

Edit it in the same way as you did for the policy on the S3 bucket for the source account

Instead of adding a resource statement which is what you're accessing

you'll need to add a principal statement which is who is accessing the resource

For each source account you will need to add a line. Remember to use square brackets and commas appropriately.

Then update the trust policy

Now the target account configuration is complete it's time to configure the source account

Login to your source AWS console to enable CloudTrail

Navigate to Services and under Management Tools select CloudTrail

Give the CloudTrail a name. Notice by default it's enabled for all regions and

is capturing all events.

Select No for create a new S3 bucket.

In the S3 bucket field enter the name of the target accounts S3 bucket and select the name of the bucket

S3 bucket names are globally unique and it is important to be exact

If AWS throws the error 'bucket doesn't exist', choose a different bucket

This means the policy on the targets S3 bucket is incorrect

So you would need to go back to the target S3 buckets policy to ensure it is configured correctly

If you used a log file prefix to change the

default location of the CloudTrail logs, make sure the policy ARN has the right

path in the target accounts S3 bucket policy. Create the CloudTrail.

This will take you to the CloudTrail service. You will see the CloudTrail you just created

and the name of the S3 bucket its piping is logs to.

Choosing the CloudTrail name will take you into the configurations page where you can

validate the settings of the CloudTrail. Here you can edit the configurations,

disable the cloud trail or delete it altogether.

Congratulations! You've configured cross account logging.

Thank you for watching.

For more infomation >> Oracle CASB Cloud Service: Turn on Cross Account Logging in AWS - Duration: 8:10.

-------------------------------------------

Oracle CASB Cloud Service: Configuring and Registering AWS - Video Key - Duration: 3:02.

There are multiple ways to configure Amazon Web Services to be monitored by

Oracle CASB Cloud Service.

This video outlines the instructions required for your particular architecture and configuration.

If you are using access and secret keys to secure your AWS account or accounts,

please follow the videos for an IAM user.

If you would prefer to use an IAM role to secure your AWS account or accounts,

follow the videos for an IAM role.

There are four different scenarios in this series.

Follow the scenario that is applicable to your architecture.

For an IAM user as a dedicated service account for a single instance, you will need the following videos:

Turn on CloudTrail and S3 in an AWS account

Create a dedicated service account for a standalone AWS account

and register standalone AWS account using dedicated service account to Oracle CASB Cloud Service.

For an IAM user in cross-account logging configuration, you will need the following videos:

Turn on CloudTrail and S3 in an AWS account

Create a dedicated service account for target AWS account in cross-account logging

Register target AWS account using dedicated service account to Oracle CASB Cloud Service

Create a dedicated service account for source AWS account in cross-account logging

Turn on cross account logging in AWS

and register source AWS account using dedicated service account to Oracle CASB Cloud Service

If you are using an IAM role, you will need the following videos:

Turn on CloudTrail and S3 in an AWS account

and create an IAM role and register a standalone AWS account using an IAM role

For an IAM role in a cross-account logging configuration, you will need the following videos:

Turn on CloudTrail and S3 in an AWS account

Create an IAM role and register a target AWS account to Oracle CASB Cloud Service using an IAM role

Create an IAM role

Turn on cross-account logging

and register a source AWS account to Oracle CASB Cloud Service using an IAM role

Thank you for watching

Không có nhận xét nào:

Đăng nhận xét