Create an S3 storage bucket on AWS using the AWS Key Management Service (KMS) to
store files that match your
Enterprise Data Loss Prevention (E-DLP)
data profiles on
Strata Cloud Manager
.
Where Can I Use This?
What Do I Need?
Strata Cloud Manager
Enterprise Data Loss Prevention (E-DLP)
license
(
SaaS Security
only
)
SaaS Security
license
Prisma Access
license
AIOps for NGFW Premium
license
AIOps for NGFW Free
license
Amazon Web Services (AWS) users can configure an S3 storage bucket using the AWS Key
Management Service (KMS) to automatically upload all files that match an
To store your files scanned by the DLP cloud service, you must create an S3 storage
bucket and Identity and Access Management (IAM) role that allows the DLP cloud
service access to automatically store files. Palo Alto Networks provides you with a
JSON data containing the required policy permissions to create the IAM role. Files
uploaded to your S3 storage bucket are automatically named using a unique Report ID
for each file. The Report ID is used to search and download specific files for more
in-depth investigation.
In case of connection issues to your S3 storage bucket due to configuration error or
change in settings on the bucket, an email is automatically generated and sent to
the admin that originally connected
Strata Cloud Manager
to the storage bucket and
to the user who last modified the storage bucket connection settings on
Strata Cloud Manager
. This email is sent out every 48 hours until the connection is
restored.
Files that are scanned by the DLP cloud service while
Strata Cloud Manager
is
disconnected from your storage bucket can't be stored and are lost. This means
that all impacted files are not available for download. However, all snippet
data is preserved and can still be viewed on
Strata Cloud Manager
.
File storage automatically resumes after the connection status is restored.
if one does not
already exist. Refer to AWS Documentation for more
information on creating a new KMS key.
Create bucket
.
Obtain the ARN for the S3 storage bucket.
After creating the S3 storage bucket, you're redirected back to the
Buckets
page. Search for and click the
storage bucket you created.
Click
Properties
. The storage bucket ARN is
displayed in the
Bucket overview
.
Enable the AWS KMS setting for the storage bucket and locate the trust
relationship and access policy JSONs provided by Palo Alto Networks.
Log into
Strata Cloud Manager
.
Select
Manage
Configuration
Security Services
Data Loss Prevention
Settings
Sensitive Data
.
In
Evidence Storage
, select
Configure Bucket
AWS
as the Public Storage Bucket.
Toggle
KMS Enabled
enable an S3 storage bucket
using AWS KMS.
In
Instructions - AWS
, locate the trust
relationship and access policy JSON provided to define the trust
relationship and access policy between the IAM role and Palo Alto
Networks.
The first JSON provided is the trust relationship and the second is
the access policy. Highlighted are the copy buttons that you will
use later on to create the IAM role for the S3 storage bucket.
Leave the
Configure Bucket for Evidence
Storage
display open and continue to create the
IAM role for the S3 storage bucket in a separate browser window.
Create the IAM role for the S3 storage bucket.
This role is required to allow the DLP cloud service to write to the S3
storage bucket.