This rule ensures logging is enabled on AWS WAFv2 regional and global web access control lists.
Rule | Logging should be enabled on AWS WAFv2 regional and global web access control list (ACLs) |
Framework | CISA-cyber-essentials |
Severity | ✔ Low |
Rule Description
The rule states that logging should be enabled on AWS WAFv2 regional and global web access control lists (ACLs) for CISA-cyber-essentials. Enabling logging helps in monitoring and analyzing web traffic, allowing security teams to detect and respond to potential security threats.
Troubleshooting
If logging is not enabled on the specified web access control lists, follow the troubleshooting steps below:
Verify AWS WAFv2 ACL: Ensure that the AWS WAFv2 ACL in question is properly configured and associated with the desired resources (e.g., Amazon API Gateway, Application Load Balancer, etc.).
Check Logging Configuration: Confirm whether logging is already enabled or not. If not, proceed with the remediation steps mentioned below.
Remediation Steps
To enable logging on AWS WAFv2 regional and global web access control lists, follow the step-by-step guide below:
Step 1: Access AWS WAFv2 Console
Step 2: Select Web ACL
Step 3: Enable Logging
Step 4: Configure Logging Data
Step 5: Verify Logging
Additional Recommendations
Here are a few additional recommendations to enhance your logging and monitoring capabilities:
Conclusion
Enabling logging on AWS WAFv2 regional and global web access control lists is crucial for effective security monitoring and incident response. By following the provided remediation steps, you can ensure that the desired logs are generated and stored, assisting in identifying potential threats and maintaining a secure environment.
! Remember to adhere to your organization's security policies and compliance requirements while enabling logging on AWS WAFv2 ACLs.