Third-party data sources integration
Integrating CloudWatch pipelines with your third-party data source let you connect external security tools, identity providers, and monitoring platforms to CloudWatch pipelines for centralized data analysis. This integration consolidates security events, audit logs, and telemetry data from multiple sources.
Note
Data collected from third-party sources is mutated to adhere to the required schema when it is collected by CloudWatch pipelines. The original data source is not retained by CloudWatch.
Third-party data can be collected using two methods:
-
Direct API Integration – Some sources offer Event Stream APIs where you only need to provide API credentials to configure the connector
-
S3 Bucket Integration – Data from sources can be ingested into a customer-managed S3 bucket for CloudWatch pipelines to collect
The following table identified the integrations methods used by the supported third-party data platforms:
| Source | Integration Pattern | Requires S3 bucket | Requires SQS Queue | Uses Secrets Manager extension | Required IAM Policies |
|---|---|---|---|---|---|
| CrowdStrike Falcon | S3 Delivery | Yes | Yes | No | Source-specific IAM policies |
| Microsoft Office 365 | API | No | No | Yes | API caller permissions |
| Microsoft Entra ID | API | No | No | Yes | API caller permissions |
| Palo Alto Networks Next Generation Firewall | API | No | No | Yes | API caller permissions |
| Microsoft Windows Event Logs | API | No | No | Yes | API caller permissions |
| Wiz CNAPP | API | No | No | Yes | API caller permissions |
| Zscaler ZIA/ZPA | S3 Delivery | Yes | Yes | No | Source-specific IAM policies |
| Okta SSO | API | No | No | Yes | API caller permissions |
| SentinelOne | S3 Delivery | Yes | Yes | No | Source-specific IAM policies |
| GitHub | API | No | No | Yes (optional) | API caller permissions |
| ServiceNow CMDB | API | No | No | Yes | API caller permissions |
Data transformation and standardization
Third-party integrations support data transformation to standardized formats for consistent analysis:
-
Open Cybersecurity Schema Framework (OCSF) – Converts security events from different vendors into a common schema for unified threat detection and analysis. Because OCSF is only for certain event classes, not all raw events are mapped to OCSF.
-
Custom transformations – Pipeline processors that normalize data formats, enrich events with additional context, and filter relevant information.
-
Field mapping – Automatic mapping of vendor-specific fields to standardized field names for consistent querying and analysis.
Note
Storing telemetry data from third-party sources in OCSF is an optional feature that might not be available for all data sources.
Log group
Third-party data is ingested into a CloudWatch log group. If you are using the AWS Management Console to configure CloudWatch pipelines if the log group does not exist, it is created automatically through the wizard process.
Authentication and security
Third-party integrations use secure authentication methods to protect data in transit:
-
OAuth 2.0 and application registration – Secure token-based authentication for cloud platforms like Microsoft and Okta.
-
API keys and certificates – Encrypted authentication credentials for direct API access.
-
IAM roles and policies – AWS Identity and Access Management integration for secure S3 bucket access and cross-account data sharing.
Note
Data collected from third-party sources is mutated to adhere to the required schema when it is collected by CloudWatch pipelines. The original data source is not retained by CloudWatch.
Each integration requires platform-specific configuration to establish secure data delivery to your AWS environment.
The following sections provide detailed setup procedures for supported third-party integrations. Each integration includes prerequisites, configuration steps, and validation procedures to ensure proper data flow.