Ensure compliance by archiving GuardDuty findings to meet Incident Response benchmarks.
Rule | GuardDuty findings should be archived |
Framework | FedRAMP Low Revision 4 |
Severity | ✔ Medium |
Rule Description
The rule requires that GuardDuty findings, an AWS service that detects threats to your AWS environment, should be archived specifically for FedRAMP Low Revision 4 compliance. This is to ensure that any potential security incidents or threats are properly documented and retained for future reference and analysis, adhering to the security requirements set by FedRAMP Low Revision 4.
Remediation Steps
To remediate this rule and ensure compliance with FedRAMP Low Revision 4, follow the steps below:
Step 1: Enable GuardDuty in your AWS Account
If you have not already enabled GuardDuty, follow these steps to enable it:
Step 2: Configure GuardDuty Findings Archive
To configure GuardDuty to archive findings for FedRAMP Low Revision 4 compliance, perform the following steps:
Step 3: Ensure Access Controls for S3 Bucket
To ensure the proper access controls for the S3 bucket where the GuardDuty findings are archived, take the following steps:
Step 4: Monitoring and Verification
Once the configuration and access controls are in place, it is important to monitor and verify the proper archiving of GuardDuty findings. Perform the following checks:
Troubleshooting
In case you encounter any issues while implementing this rule, consider the following troubleshooting steps:
If the troubleshooting steps do not resolve the issue, consider reaching out to AWS Support for further assistance and guidance.
Conclusion
By following the above steps, you can ensure that GuardDuty findings are properly archived for FedRAMP Low Revision 4 compliance. Regular monitoring and verification of findings will help to maintain a secure AWS environment and enhance the overall security posture.