This rule requires enabling logging for S3 buckets to ensure proper configuration management.
Rule | S3 bucket logging should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Low |
Rule Description:
S3 bucket logging should be enabled to comply with the NIST 800-53 Revision 5 security standard. Enabling logging for S3 buckets helps in tracking access, identifying unauthorized activities, and preserving important audit trail information. This rule ensures that all buckets have logging enabled, which is crucial for meeting the security requirements specified by NIST 800-53 Revision 5.
Troubleshooting Steps (if any):
Necessary Code (if any):
No code snippet is necessary for this rule. The remediation steps involve enabling logging through the AWS Management Console or using AWS Command Line Interface (CLI) commands.
Step-by-Step Guide for Remediation:
Alternatively, you can use AWS CLI to enable S3 bucket logging. Execute the following CLI command:
aws s3api put-bucket-logging --bucket <bucket-name> --logging-configuration '{"LoggingEnabled":{"TargetBucket":"<target-bucket-name>","TargetPrefix":"<log-prefix>"}}'
Ensure you replace
<bucket-name>
with the name of the bucket you want to enable logging for, <target-bucket-name>
with the name of the bucket where the logs should be stored, and <log-prefix>
with the desired prefix for the logs.By following these steps, the S3 bucket logging will be enabled, ensuring compliance with NIST 800-53 Revision 5.