Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Enable S3 Bucket Logging Rule

This rule requires enabling logging for S3 buckets to enhance audit and accountability.

RuleS3 bucket logging should be enabled
FrameworkNIST 800-53 Revision 5
Severity
Low

Rule Description

The rule mandates enabling S3 bucket logging for compliance with NIST 800-53 Revision 5. This security control ensures that all access events and API calls made to the S3 bucket are recorded and logged, providing valuable audit information and enabling effective monitoring and analysis of any unauthorized or suspicious activities.

Enabling S3 bucket logging will generate log files that capture details such as the requester's Amazon Web Services (AWS) account, the source IP address, the actions performed, and the outcome of those actions. These logs aid in the investigation of security incidents, help in identifying potential threats, and comply with regulatory requirements.

Troubleshooting Steps

If S3 bucket logging is not already enabled, follow the troubleshooting steps below:

  1. 1.

    Ensure Proper Permissions: Ensure that you have sufficient permissions to enable S3 bucket logging. You need to have AWS Identity and Access Management (IAM) privileges that permit the modification of S3 bucket settings.

  2. 2.

    Verify Bucket Creation: Confirm that the S3 bucket you intend to enable logging for already exists. If not, create a new S3 bucket before proceeding.

  3. 3.

    Check S3 Bucket Logging Status: Verify the current logging status of your S3 bucket by following these steps:

    a. Open the AWS Management Console for S3.

    b. Select the target S3 bucket.

    c. Click on the "Properties" tab.

    d. Scroll down to the "Server access logging" section and check if logging is already enabled or disabled.

  4. 4.

    Enable Logging: If logging is disabled, proceed with enabling S3 bucket logging using the following steps:

    a. Open the AWS Management Console for S3.

    b. Select the target S3 bucket.

    c. Click on the "Properties" tab.

    d. Scroll down to the "Server access logging" section and click on the "Edit" button.

    e. Check the "Enable log delivery for this bucket" checkbox.

    f. Specify the target S3 bucket to store the access logs and select a desired log file prefix if needed.

    g. Save the changes by clicking on the "Save changes" button.

  5. 5.

    Verify Logging Status: Once you have enabled logging, verify the updated status by following the steps outlined in step 3. Confirm that the logging status is now enabled for the target S3 bucket.

Necessary Codes

No specific codes are required for enabling S3 bucket logging. The process can be accomplished through the AWS Management Console as explained in the troubleshooting steps.

Remediation Steps

To enable S3 bucket logging for compliance with NIST 800-53 Revision 5, follow the step-by-step guide below:

  1. 1.
    Log in to the AWS Management Console.
  2. 2.
    Open the S3 service.
  3. 3.
    Select the desired S3 bucket for which logging needs to be enabled.
  4. 4.
    Click on the "Properties" tab.
  5. 5.
    Scroll down to the "Server access logging" section.
  6. 6.
    If logging is already enabled, skip to step 10.
  7. 7.
    Click on the "Edit" button.
  8. 8.
    Check the "Enable log delivery for this bucket" checkbox.
  9. 9.
    Specify the target S3 bucket where the access logs will be stored and provide a log file prefix if required.
  10. 10.
    Save the changes by clicking on the "Save changes" button.
  11. 11.
    Verify that the logging status is now enabled for the selected S3 bucket by checking the "Properties" tab again.
  12. 12.
    Monitor the S3 bucket access logs periodically for any suspicious activities or unauthorized access attempts.

By following these steps, you will successfully enable S3 bucket logging and meet the requirements of NIST 800-53 Revision 5.

Is your System Free of Underlying Vulnerabilities?
Find Out Now