Ensure log group encryption at rest is enabled to maintain high security standards.
Rule | Log group encryption at rest should be enabled |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ High |
Rule Description:
The rule "Log group encryption at rest should be enabled for NIST Cybersecurity Framework (CSF) v1" ensures that encryption is enabled for log groups in order to adhere to the security requirements set by the NIST Cybersecurity Framework (CSF) version 1.
Troubleshooting Steps:
Verify Log Group Encryption Setting:
Enable Encryption at Rest:
Necessary Codes:
There are no specific codes required for this rule. Encryption settings can be modified directly through the AWS Management Console.
Remediation Steps:
To enable encryption at rest for log groups in AWS CloudWatch, follow these steps:
Open the AWS Management Console and navigate to the CloudWatch service.
From the CloudWatch dashboard, click on "Log groups" in the left sidebar.
Search for the relevant log group that needs encryption enabled, and click on it.
On the log group details page, click on the "Actions" dropdown menu above the log events.
Select "Modify log group" from the available options.
In the "Modify log group" dialog box, scroll down to the "Encryption (optional)" section.
Choose the encryption option that aligns with the NIST CSF v1 requirements. This can be done by selecting an appropriate KMS key or using the default CMK.
Once you have selected the encryption option, click on the "Save" button to apply the changes.
Verify that the encryption at rest is now enabled for the log group by checking the "Encryption" setting on the log group details page.
By following these steps, you can ensure that encryption at rest is enabled for log groups in accordance with the NIST CSF v1 requirements.