This rule ensures the presence of a log metric filter for any changes made to Network Access Control Lists (NACL).
Rule | Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Low |
Rule Description:
This rule ensures that a log metric filter and alarm are in place to monitor any changes made to Network Access Control Lists (NACL) in accordance with the NIST Cybersecurity Framework (CSF) v1.
Troubleshooting Steps (if any):
The following troubleshooting steps can be taken if the log metric filter and alarm for NACL changes are not functioning properly:
Verify the CloudWatch Logs: Ensure that the CloudWatch Logs are enabled and configured correctly. Check if the logs related to NACL changes are being captured and stored in CloudWatch Logs.
Validate the Log Metric Filter: Double-check the Log Metric Filter configuration to ensure it accurately captures the relevant log events related to NACL changes. Ensure that the filter pattern matches the event structure and log data.
Check Alarm Configuration: Review the Alarm configuration to ensure it is set up correctly. Verify that the threshold conditions, actions to be taken, and notification settings are appropriately configured.
Testing and Verification: Create a test NACL change event and monitor the CloudWatch Logs and Alarm to ensure they correctly trigger an alert. If the test event does not generate an alarm, investigate and troubleshoot any misconfigurations or issues in the filter pattern or alarm settings.
Consulting Documentation: Consult the AWS documentation for CloudWatch Logs and Alarms to ensure adherence to the recommended practices and troubleshooting steps.
Necessary Codes (if any):
No necessary codes provided.
Step-by-Step Guide for Remediation:
To ensure that a log metric filter and alarm exist for NACL changes in accordance with NIST CSF v1, follow the step-by-step guide below:
Log in to the AWS Management Console.
Open the CloudWatch service.
Click on "Logs" in the left-hand navigation pane.
Select the appropriate log group that captures the NACL change events. If the log group does not exist, create it by clicking on "Create log group" and provide a meaningful name.
Click on "Create Metric Filter" in the top-right corner.
In the "Create Metric Filter" wizard, select the log group you want to create the filter for.
Define the filter pattern that matches the log events related to NACL changes. For example, you can use the following filter pattern:
{ $.eventName = "ModifyNetworkAclEntry" }
This pattern captures the events where a modification is made to a Network ACL entry.
Define a name for the filter and click on "Test Pattern" to verify that it captures the desired events. Adjust the pattern if necessary.
Click on "Assign Metric" to specify the metric namespace and dimensions for the filtered events. For example, you can use the following settings:
Configure the metric value extraction if required. Click on "Create Filter" once all the settings are configured.
Now, navigate to the CloudWatch service home page and click on "Alarms" in the left-hand navigation pane.
Click on "Create Alarm" to begin configuring the alarm for NACL changes.
In the "Create Alarm" wizard, select the appropriate metric related to NACL changes (e.g., Custom/NACLChanges).
Specify the conditions based on your requirements. For example, you can set the threshold to "Any data point" and choose "Greater/Equal" and set the threshold value to 1.
Configure the actions to be taken when the alarm state is triggered, such as sending a notification via SNS, executing an AWS Lambda function, or stopping an EC2 instance if necessary.
Review the alarm settings and click on "Create Alarm" to finish creating the alarm.
Test the log metric filter and alarm by making a deliberate NACL change in your environment. Verify if the change triggers the alarm and sends the appropriate notifications.
By following these steps, you can ensure that a log metric filter and alarm are in place for monitoring changes to Network Access Control Lists (NACL) as per the NIST Cybersecurity Framework (CSF) v1.