Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: S3 Bucket Logging Should Be Enabled

This rule requires enabling logging for S3 buckets to ensure system and information integrity.

RuleS3 bucket logging should be enabled
FrameworkNIST 800-53 Revision 5
Severity
Low

Rule Description:

S3 bucket logging should be enabled to comply with the NIST 800-53 Revision 5 security control. This control ensures that all access and usage activity within S3 buckets is logged, helping to detect any unauthorized access or changes to the data stored in the buckets.

Troubleshooting Steps:

  1. 1.
    Check if S3 bucket logging is enabled for all relevant buckets.
  2. 2.
    Verify if appropriate permissions are granted to the necessary AWS Identity and Access Management (IAM) roles and users.
  3. 3.
    Review the AWS CloudTrail logs to verify if there are any errors or issues related to S3 bucket logging.
  4. 4.
    Check if there are any restrictions or blocked actions that could be affecting bucket logging.

Necessary Codes:

No specific code is required for this rule; it involves enabling bucket logging through the AWS Management Console or using AWS CLI commands.

Step-by-Step Guide for Remediation:

To enable S3 bucket logging for NIST 800-53 Revision 5, follow the steps below:

  1. 1.

    Sign in to the AWS Management Console using the appropriate IAM role or user credentials.

  2. 2.

    Navigate to the S3 service by clicking on "Services" in the top navigation panel and searching for "S3". Click on "S3" to open the S3 dashboard.

  3. 3.

    Locate the target bucket for which you want to enable logging and click on its name to open its details.

  4. 4.

    Under the "Properties" tab, navigate to the "Server access logging" section.

  5. 5.

    Click on "Edit" to modify the logging settings of the bucket.

  6. 6.

    Enable server access logging by selecting the option "Enable logging" and providing an existing bucket that will be used to store the logs.

  7. 7.

    Specify a log prefix if needed to organize the logs within the bucket.

  8. 8.

    Choose the desired log file format (e.g., "Common Log Format (CLF)", "W3C Extended Format").

  9. 9.

    Select the appropriate log file encryption option (e.g., SSE-S3, SSE-KMS, or none).

  10. 10.

    Review the logging settings, ensuring they are correctly configured based on the requirements of NIST 800-53 Revision 5.

  11. 11.

    Click on "Save changes" to enable logging for the bucket.

  12. 12.

    Validate the logging configuration by confirming that the bucket now shows logging as enabled.

  13. 13.

    Repeat the process for other relevant buckets to ensure compliance with the policy.

By following these steps, you will successfully enable S3 bucket logging for NIST 800-53 Revision 5 in your AWS environment.

Is your System Free of Underlying Vulnerabilities?
Find Out Now