This rule requires enabling logging for S3 buckets to enhance audit and accountability.
Rule | S3 bucket logging should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Low |
Rule Description
The rule mandates enabling S3 bucket logging for compliance with NIST 800-53 Revision 5. This security control ensures that all access events and API calls made to the S3 bucket are recorded and logged, providing valuable audit information and enabling effective monitoring and analysis of any unauthorized or suspicious activities.
Enabling S3 bucket logging will generate log files that capture details such as the requester's Amazon Web Services (AWS) account, the source IP address, the actions performed, and the outcome of those actions. These logs aid in the investigation of security incidents, help in identifying potential threats, and comply with regulatory requirements.
Troubleshooting Steps
If S3 bucket logging is not already enabled, follow the troubleshooting steps below:
Ensure Proper Permissions: Ensure that you have sufficient permissions to enable S3 bucket logging. You need to have AWS Identity and Access Management (IAM) privileges that permit the modification of S3 bucket settings.
Verify Bucket Creation: Confirm that the S3 bucket you intend to enable logging for already exists. If not, create a new S3 bucket before proceeding.
Check S3 Bucket Logging Status: Verify the current logging status of your S3 bucket by following these steps:
a. Open the AWS Management Console for S3.
b. Select the target S3 bucket.
c. Click on the "Properties" tab.
d. Scroll down to the "Server access logging" section and check if logging is already enabled or disabled.
Enable Logging: If logging is disabled, proceed with enabling S3 bucket logging using the following steps:
a. Open the AWS Management Console for S3.
b. Select the target S3 bucket.
c. Click on the "Properties" tab.
d. Scroll down to the "Server access logging" section and click on the "Edit" button.
e. Check the "Enable log delivery for this bucket" checkbox.
f. Specify the target S3 bucket to store the access logs and select a desired log file prefix if needed.
g. Save the changes by clicking on the "Save changes" button.
Verify Logging Status: Once you have enabled logging, verify the updated status by following the steps outlined in step 3. Confirm that the logging status is now enabled for the target S3 bucket.
Necessary Codes
No specific codes are required for enabling S3 bucket logging. The process can be accomplished through the AWS Management Console as explained in the troubleshooting steps.
Remediation Steps
To enable S3 bucket logging for compliance with NIST 800-53 Revision 5, follow the step-by-step guide below:
By following these steps, you will successfully enable S3 bucket logging and meet the requirements of NIST 800-53 Revision 5.