Ensure logging is enabled on AWS WAFv2 regional and global web access control list (ACLs)
Rule | Logging should be enabled on AWS WAFv2 regional and global web access control list (ACLs) |
Framework | FedRAMP Moderate Revision 4 |
Severity | ✔ Low |
Rule Description:
Logging should be enabled on AWS WAFv2 regional and global web access control list (ACLs) for FedRAMP Moderate Revision 4. This ensures that all relevant web traffic is recorded and can be reviewed for security analysis, compliance audits, and incident response purposes.
Troubleshooting Steps:
Necessary Codes:
There are no specific codes provided for this rule. However, you will need to use AWS CLI commands to enable logging on the regional and global web ACLs.
Step-by-step Guide for Remediation:
Open the AWS Management Console or access the AWS CLI.
For Regional ACLs:
Using the AWS Management Console:
Using AWS CLI:
aws wafv2 put-logging-configuration --web-acl-arn <REGIONAL_ACL_ARN> --logging-configuration='{ "logDestinationConfigs": ["<S3_BUCKET_ARN>"] }'
For Global ACLs:
Using the AWS Management Console:
Using AWS CLI:
aws wafv2 put-logging-configuration --web-acl-arn <GLOBAL_ACL_ARN> --logging-configuration='{ "logDestinationConfigs": ["<S3_BUCKET_ARN>"] }'
Verify the Changes:
Note: Ensure that you have appropriate permissions and replace the placeholder variables (<REGIONAL_ACL_ARN>, <S3_BUCKET_ARN>, <GLOBAL_ACL_ARN>) with the actual values specific to your environment.
By following the above steps, logging will be enabled on AWS WAFv2 regional and global web ACLs, allowing you to effectively track and analyze web traffic for FedRAMP Moderate Revision 4 compliance.