This rule ensures logging is enabled on AWS WAFv2 regional and global web access control lists.
Rule | Logging should be enabled on AWS WAFv2 regional and global web access control list (ACLs) |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ Low |
Rule Description: Logging on AWS WAFv2 Regional and Global Web Access Control Lists (ACLs) for NIST 800-171 Revision 2
Description:
To comply with the security requirements of NIST 800-171 Revision 2, logging should be enabled on AWS WAFv2 Regional and Global Web Access Control Lists (ACLs). Logging helps monitor and troubleshoot the traffic flow, detect and investigate potential security incidents, and enable forensic analysis.
Troubleshooting Steps:
In case logging is not enabled on AWS WAFv2 ACLs, follow the troubleshooting steps below:
Verify WAFv2 ACL Logging Settings:
Enable Logging on AWS WAFv2 ACL:
Verify Log Delivery Configuration:
Enable S3 Bucket Access Logging (Optional):
Necessary Code:
No code is required for enabling logging on AWS WAFv2 ACLs. The configuration can be done through the AWS Management Console.
Remediation Steps:
To enable logging on AWS WAFv2 Regional and Global Web Access Control Lists (ACLs) for NIST 800-171 Revision 2, follow the step-by-step guide below:
Open the AWS Management Console.
Navigate to the AWS WAFv2 service.
Select the desired regional or global ACL to enable logging.
Click on the "Logging" tab.
Toggle the "Logging status" switch to enable logging.
Configure the logging settings:
Save the changes.
Verify that the specified Amazon S3 bucket is properly configured to receive the logs and has the necessary permissions.
(Optional) Enable access logging on the S3 bucket to gain additional insights into bucket activity.
Conclusion:
Enabling logging on AWS WAFv2 ACLs ensures compliance with the security requirements of NIST 800-171 Revision 2. By following the troubleshooting steps and remediation guide provided, you can effectively configure logging settings and monitor the traffic flow on your WAFv2 ACLs.