Ensures that audit logging is enabled for Elasticsearch domains, providing detailed records of user activities and system changes.
Rule | Elasticsearch domains should have audit logging enabled |
Framework | AWS Foundational Security Best Practices |
Severity | ✔ Medium |
Rule Description:
Elasticsearch domains should have audit logging enabled to enhance security and comply with AWS Foundational Security Best Practices.
Troubleshooting Steps:
Necessary Codes:
To enable audit logging for an Elasticsearch domain, you can use the AWS SDK or AWS CLI. Here is an example of AWS CLI command:
aws es update-elasticsearch-domain-config --domain-name your-domain-name --advanced-security-options Enabled=true,InternalUserDatabaseEnabled=true,AuditLogsEnabled=true
Make sure to replace
your-domain-name
with the actual name of your Elasticsearch domain.Step-by-Step Guide for Remediation:
AuditLogsEnabled
parameter to true
.By following these steps and enabling audit logging for your Elasticsearch domain, you can enhance security and adhere to AWS Foundational Security Best Practices.