Amazon Security Lake New2022年〜
A data lake service that centralizes security data in OCSF format
What It Does
Amazon Security Lake centralizes security data from AWS services, third-party security tools, and on-premises sources into an S3-based data lake using the OCSF (Open Cybersecurity Schema Framework) format. It automatically collects and normalizes CloudTrail logs, VPC Flow Logs, Route 53 DNS logs, Security Hub findings, and more.
Use Cases
Centralized management and long-term retention of security data, SIEM tool integration, security incident investigation and analysis, and log retention for compliance audits.
Everyday Analogy
Think of a security information library. Security reports from each department (AWS services, security tools) are organized and stored in a standardized format (OCSF), making them searchable and analyzable by investigators (analysis tools) at any time.
What Is Security Lake?
Amazon Security Lake specializes in aggregating and normalizing security data. Previously, CloudTrail logs used CloudTrail's format, VPC Flow Logs used VPC's format - each data source had its own schema. Security Lake normalizes data into the OCSF standard schema, enabling cross-source analysis.
Data Sources and Subscribers
Security Lake automatically collects AWS-native log sources (CloudTrail, VPC Flow Logs, Route 53 DNS logs, S3 data events, Lambda execution logs, EKS audit logs). Data from third-party security tools can also be ingested as custom sources. The subscriber feature provides data to SIEM tools like Splunk, Datadog, and Sumo Logic. For design patterns and operational practices around data sources and subscribers, specialized books on Amazon offer detailed coverage.
Getting Started
Enable Security Lake in the console and select the log sources and regions to collect. Integration with Organizations lets you aggregate security data across the entire organization. Analyze data by running queries with Athena or connecting SIEM tools as subscribers.
Things to Watch Out For
- S3 storage costs and data normalization processing charges apply. Costs increase with large log volumes
- Security Hub aggregates security findings, while Security Lake aggregates raw log data - they serve different purposes