Follow this rule to ensure proper archiving of GuardDuty findings.
Rule | GuardDuty findings should be archived |
Framework | FedRAMP Moderate Revision 4 |
Severity | ✔ Medium |
Rule/Policy: GuardDuty findings archiving for FedRAMP Moderate Revision 4
Description:
This rule ensures that findings from AWS GuardDuty, a threat detection service, are properly archived in compliance with the FedRAMP (Federal Risk and Authorization Management Program) Moderate Revision 4 requirements. By archiving the GuardDuty findings, the organization can maintain a comprehensive record of security events and demonstrate adherence to the FedRAMP compliance standards.
Troubleshooting Steps:
If the GuardDuty findings are not getting properly archived, the following troubleshooting steps can be performed:
Verify GuardDuty service activation: Ensure that GuardDuty is activated in the AWS account where the findings need to be archived. If not, activate GuardDuty by following these steps:
Check IAM permissions: Confirm that the IAM (Identity and Access Management) role used for archiving the GuardDuty findings has the necessary permissions. The role should have appropriate permissions to access, encrypt, and store the findings securely in a compliant manner.
Verify S3 bucket configuration: Ensure that the S3 bucket used for archiving the GuardDuty findings is properly configured. The bucket should have the appropriate access control settings, encryption configured, and versioning enabled to maintain a historical record of the findings.
Check CloudTrail logging: Validate that CloudTrail logging is enabled in the AWS account. CloudTrail records and logs API activity, which is essential for monitoring and auditing GuardDuty findings archiving.
Necessary Codes:
No specific codes are required for this rule. However, configuring and maintaining the following AWS services in compliance with FedRAMP Moderate Revision 4 may be necessary:
Step-by-Step Guide for Remediation:
To adhere to the GuardDuty findings archiving requirements for FedRAMP Moderate Revision 4, follow these step-by-step instructions:
Activate GuardDuty:
Configure IAM roles and permissions:
Configure an S3 bucket for findings archiving:
Enable CloudTrail logging:
Periodically review and validate:
By following these steps, the GuardDuty findings will be archived in compliance with the FedRAMP Moderate Revision 4 requirements, providing a secure and auditable record of security events.