This rule ensures that GuardDuty findings are properly archived for compliance.
Rule | GuardDuty findings should be archived |
Framework | SOC 2 |
Severity | ✔ Medium |
GuardDuty Findings Archiving for SOC 2 Compliance
Rule Description
To comply with SOC 2 standards, it is important to ensure that all findings generated by Amazon GuardDuty are properly archived. GuardDuty is a threat detection service designed to identify potentially malicious activity within AWS accounts. By archiving these findings, you can maintain an audit trail and demonstrate compliance with SOC 2 requirements.
Troubleshooting Steps (if applicable)
If you encounter any issues with GuardDuty findings archiving, please follow the troubleshooting steps below:
Necessary Codes (if applicable)
Below is an example of AWS CLI command to enable GuardDuty findings archiving:
aws guardduty update-organization-configuration --auto-enable --data-sources.s3.bucket-arn "arn:aws:s3:::my-guardduty-bucket"
Please replace
"arn:aws:s3:::my-guardduty-bucket"
with the ARN of the S3 bucket you want to use for storing the findings.Step-by-step Guide for Remediation
Follow the step-by-step guide below to ensure proper archiving of GuardDuty findings for SOC 2 compliance:
By following these steps, you will ensure that all GuardDuty findings are automatically archived to a secure location, helping you meet SOC 2 compliance requirements.
Remember to regularly review the archived findings and establish a process for analyzing and responding to any potential threats or security incidents identified by GuardDuty.