This rule ensures that S3 bucket logging is enabled to maintain proper audit and accountability measures.
Rule | S3 bucket logging should be enabled |
Framework | FedRAMP Moderate Revision 4 |
Severity | ✔ Low |
Rule Description
The rule requires enabling S3 bucket logging for AWS S3 buckets that are in compliance with the FedRAMP Moderate Revision 4 security requirements. Enabling bucket logging ensures the collection and retention of detailed logs for tracking access to the S3 buckets, which helps in meeting compliance and security objectives.
Troubleshooting Steps
There might not be any troubleshooting steps explicitly associated with this rule. However, if any issues arise during the process of enabling S3 bucket logging, the following steps can be followed:
s3:PutBucketLogging
and s3:GetBucketLogging
.Necessary Code
No specific code is required for this rule. However, consider the following example bucket policy to enable logging for an S3 bucket:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowBucketLogging",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::AWS_ACCOUNT_ID:root"
},
"Action": "s3:PutBucketLogging",
"Resource": "arn:aws:s3:::BUCKET_NAME"
}
]
}
Make sure to replace
AWS_ACCOUNT_ID
with the AWS account ID and BUCKET_NAME
with the actual bucket name.Step by Step Guide - Enabling S3 Bucket Logging
Follow these steps to enable S3 bucket logging for FedRAMP Moderate Revision 4 compliance:
That's it! The S3 bucket logging is now enabled for FedRAMP Moderate Revision 4 compliance. The logs will be generated and stored in the specified target bucket, providing detailed information about access and usage of the S3 bucket.