This rule ensures that GuardDuty findings are properly archived to maintain cybersecurity controls.
Rule | GuardDuty findings should be archived |
Framework | Federal Financial Institutions Examination Council (FFIEC) |
Severity | ✔ Medium |
Rule Description:
The rule states that GuardDuty findings should be archived for Federal Financial Institutions Examination Council (FFIEC) compliance. GuardDuty is a threat detection service provided by Amazon Web Services (AWS), and it monitors for malicious activity and unauthorized behavior in your AWS environment. Archiving GuardDuty findings ensures compliance with the security regulations set by FFIEC, which is responsible for establishing unified and consistent supervisory standards for financial institutions.
Troubleshooting Steps (if applicable):
Verify GuardDuty service activation: Ensure that GuardDuty is enabled and running in your AWS environment. You can check this by navigating to the GuardDuty service in the AWS Management Console and ensuring that it is active.
Check FFIEC compliance requirements: Review the specific compliance requirements set by FFIEC for financial institutions. This will help you understand the necessary steps for archiving GuardDuty findings in a compliant manner.
Configure S3 bucket for archiving: Set up an S3 bucket to store the archived GuardDuty findings. This will serve as a centralized location for storing and managing the data in compliance with FFIEC regulations.
Enable GuardDuty finding archiving: To enable GuardDuty finding archiving, you need to configure the service to send findings to the designated S3 bucket. Ensure that you have the necessary permissions to make the required configuration changes.
Test the archiving setup: Generate a sample GuardDuty finding or simulate a potential threat to verify that the findings are being correctly archived in the designated S3 bucket.
Necessary Codes (if required):
There are no specific codes required for this rule.
Step-by-Step Guide for Remediation:
Go to the S3 service in the AWS Management Console.
Click on "Create bucket" and provide a unique name for the bucket.
Configure the desired settings for the bucket, such as region and access control.
Click on "Create" to create the S3 bucket.
Open the GuardDuty console.
Select the specific GuardDuty detector.
Click on "Manage S3 Data Event Publishing".
Enable the "Archive findings to S3" option.
Select the S3 bucket that you created in step 5.
Click on "Save" to apply the changes.
Remember to follow any additional guidelines and security best practices provided by AWS and FFIEC to ensure the overall security and compliance of your AWS environment.