This rule emphasizes the need to archive GuardDuty findings for improved security measures.
Rule | GuardDuty findings should be archived |
Framework | RBI Cyber Security Framework |
Severity | ✔ Medium |
Rule Description:
The rule mandates that GuardDuty findings should be archived to comply with the RBI (Reserve Bank of India) Cyber Security Framework. GuardDuty is a threat detection service offered by Amazon Web Services (AWS) that continuously monitors for malicious activity and unauthorized behavior within AWS accounts.
Troubleshooting Steps:
If you encounter any issues while archiving GuardDuty findings, follow these troubleshooting steps:
Validate IAM Permissions: Ensure that the IAM (Identity and Access Management) user or role used to configure GuardDuty has sufficient permissions to read and archive findings. Make sure the necessary IAM policies are attached to the user or role.
Check S3 Bucket Permissions: Verify that the S3 bucket used for archiving GuardDuty findings has the appropriate permissions. The IAM user or role associated with GuardDuty should have write access to the S3 bucket.
Configure SNS Topic: Ensure that a valid SNS (Simple Notification Service) topic is configured for receiving notifications about new GuardDuty findings. Verify the topic's ARN (Amazon Resource Name) and confirm that it is correctly configured in the GuardDuty settings.
Verify EventBridge (CloudWatch Events) Configuration: If you are using EventBridge to forward GuardDuty findings to another service or store, double-check the EventBridge rule configuration. Ensure that the event rule matches the desired findings and targets the correct destination.
Necessary Codes:
There are no specific codes required for this rule. However, you can use AWS CLI commands or SDKs to retrieve and archive GuardDuty findings programmatically. Below are some examples:
aws guardduty list-findings
aws guardduty archive-findings --detector-id <detector-id> --finding-ids <finding-ids>
Replace
<detector-id>
with the actual ID of your GuardDuty detector and <finding-ids>
with one or multiple finding IDs separated by spaces.Step-by-Step Guide for Remediation:
Follow these steps to remediate the issue and comply with the RBI Cyber Security Framework by archiving GuardDuty findings:
Login to the AWS Management Console.
Open the GuardDuty service.
Ensure that the desired AWS region is selected.
Click on the "Detectors" tab in the left navigation pane.
Select the appropriate detector from the list.
Click on the "Settings" tab.
Scroll down to the "Findings Management" section.
Enable the "Archive findings" option.
Enter the ARN of the S3 bucket where you want to archive the findings.
(Optional) If you want to receive notifications about new findings, enter the ARN of the SNS topic in the "Security alerts notification" field.
Save the settings.
Test the configuration by generating a sample finding and verifying if it gets archived to the specified S3 bucket.
Following these steps ensures that GuardDuty findings are archived as required by the RBI Cyber Security Framework.