Ensure compliance by enabling GuardDuty rule to meet Configuration Management benchmarks.
Rule | GuardDuty should be enabled |
Framework | FedRAMP Moderate Revision 4 |
Severity | ✔ High |
Enabling GuardDuty for FedRAMP Moderate Revision 4
Amazon GuardDuty is a managed threat detection service that continuously monitors your AWS accounts and workloads for malicious activity and delivers detailed findings for visibility and compliance. To comply with FedRAMP Moderate Revision 4, AWS resources must adhere to specific security controls and configurations, including the monitoring of account activity and anomaly detection.
Rule Details
GuardDuty must be enabled to monitor and report on potential security incidents within your AWS environment. It addresses various security controls required by FedRAMP, such as incident response, anomaly detection, and malicious activity monitoring.
Troubleshooting Steps
If GuardDuty is not enabled, or issues arise post-activation, here are some troubleshooting steps:
Verify GuardDuty Service Status
Permissions Issues
guardduty:*
and iam:CreateServiceLinkedRole
.Network Connectivity
Necessary Codes
When it comes to enabling GuardDuty and automating its setup, using AWS CLI commands or AWS SDK scripts would be relevant. Here's an example using AWS CLI:
Enable GuardDuty
To enable GuardDuty via AWS CLI, enter the following command:
aws guardduty create-detector --enable
This command will return a
DetectorId
which you will use to reference your GuardDuty detector.Step by Step Guide for Remediation
Step 1: Enable GuardDuty through AWS Console
Step 2: Enable via AWS CLI
Step 3: Configure GuardDuty (Optional)
Step 4: Review Findings
CLI Commands Required
List Detectors
In case you need to list existing detectors:
aws guardduty list-detectors
Disable GuardDuty
To disable GuardDuty, if necessary, for a specific detector:
aws guardduty delete-detector --detector-id <DetectorId>
Replace
<DetectorId>
with the actual ID of your detector.Update Detector Settings
Update the GuardDuty detector's settings, if needed:
aws guardduty update-detector --detector-id <DetectorId> --finding-publishing-frequency <Value>
The
finding-publishing-frequency
can be set to one of the allowed values (e.g., FIFTEEN_MINUTES
, ONE_HOUR
, SIX_HOURS
).This rule is established to ensure that your AWS environments align with FedRAMP's stringent security protocols, thus maintaining compliance and reducing risks associated with cyber threats. Employing these practices will not just help in adherence to regulatory standards but can also improve overall security posture, which can be a beneficial aspect for SEO due to the increased trust and reliability of your services.