Ensure that GuardDuty findings are properly archived to maintain compliance.
Rule | GuardDuty findings should be archived |
Framework | NIST 800-53 Revision 4 |
Severity | ✔ Medium |
Rule Description:
The rule requires that all findings from AWS GuardDuty, a threat detection service, should be archived in compliance with the National Institute of Standards and Technology (NIST) 800-53 Revision 4. This is to ensure that any potential security incidents or threats identified by GuardDuty are properly documented and stored for further analysis and audit purposes.
Troubleshooting Steps (if applicable):
Necessary Code (if applicable):
There is no specific code required for this rule. However, you may need to use AWS CLI or SDKs to interact with GuardDuty API for troubleshooting and configuration purposes.
Remediation Steps:
Enable GuardDuty in AWS Account: To enable GuardDuty in your AWS account, follow these steps:
Configure GuardDuty Findings Archival: To archive GuardDuty findings, follow these steps:
Verify Findings Archival: To verify if the findings are being archived correctly, follow these steps:
Conclusion:
By following the above steps, you can ensure that all GuardDuty findings are appropriately archived in compliance with the NIST 800-53 Revision 4. This helps in maintaining a comprehensive record of potential security threats and incidents for analysis and auditing purposes.