This rule ensures GuardDuty is enabled. High severity.
Rule | GuardDuty should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description: GuardDuty should be enabled for NIST 800-53 Revision 5
Rule Overview:
This rule ensures that AWS GuardDuty, a threat detection service, is enabled and properly configured to comply with the security controls outlined in the NIST 800-53 Revision 5 framework. GuardDuty continuously monitors AWS accounts for malicious activity and provides alerts for potential security threats.
Policy Details:
To comply with NIST 800-53 Revision 5, GuardDuty must be enabled and configured properly. The following steps help ensure GuardDuty is set up correctly:
Troubleshooting Steps:
If GuardDuty is not enabled or not properly configured, follow these troubleshooting steps:
Necessary Code:
There are no specific code snippets required for this rule. The configuration of GuardDuty is typically done through the AWS Management Console or the AWS Command Line Interface (CLI).
Step-by-step Guide for Remediation:
Enabling GuardDuty:
Configuring GuardDuty to Monitor All Relevant AWS Regions:
Configuring GuardDuty Threat Intelligence Feeds:
Enabling GuardDuty Notifications:
Conclusion:
By following the steps mentioned above, you can ensure that GuardDuty is enabled and configured to comply with the security controls outlined in the NIST 800-53 Revision 5 framework. Regularly monitoring GuardDuty findings and taking appropriate actions can help identify and mitigate potential security threats in your AWS environment.