Ensure compliance by enabling GuardDuty for system and communications protection.
Rule | GuardDuty should be enabled |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ High |
Rule Description:
This rule states that GuardDuty, an intelligent threat detection service provided by AWS, should be enabled specifically for meeting the security requirements outlined in the National Institute of Standards and Technology (NIST) Special Publication 800-171 Revision 2.
GuardDuty continuously monitors and analyzes AWS logs and network activity for potential security threats and vulnerabilities. Enabling GuardDuty for NIST 800-171 Revision 2 ensures that your AWS environment is being actively monitored for any suspicious or malicious activities that could potentially violate the security requirements specified in the NIST 800-171 framework.
Troubleshooting Steps (if applicable):
Troubleshooting steps are not necessary for this rule, as it is more of a configuration requirement to be met.
Necessary Codes (if applicable):
If you have not already enabled GuardDuty in your AWS account, you can use the AWS Command Line Interface (CLI) to enable it. Here is the necessary CLI command:
aws guardduty create-detector --enable
This command enables GuardDuty in your AWS account and automatically sets up a detector.
Step-by-step Guide for Remediation:
To enable GuardDuty for NIST 800-171 Revision 2, follow these steps:
Once GuardDuty is enabled, it will start analyzing your AWS logs and network activity for potential security threats. You can review the findings in the GuardDuty console or set up automatic notifications for any detected threats.
By enabling GuardDuty for NIST 800-171 Revision 2, you are taking a proactive step towards meeting the security requirements outlined in the NIST framework and ensuring the safety of your AWS environment.