This rule requires logging to be enabled on AWS WAFv2 regional and global web access control lists.
Rule | Logging should be enabled on AWS WAFv2 regional and global web access control list (ACLs) |
Framework | FedRAMP Moderate Revision 4 |
Severity | ✔ Low |
Rule Details:
This rule requires that logging is enabled on AWS WAFv2 regional and global web access control lists (ACLs) for FedRAMP Moderate Revision 4 compliance. Logging enables the capture and analysis of web requests and allows for proactive monitoring and alerting of potential security incidents.
Enabling logging on AWS WAFv2 regional and global ACLs ensures that all web traffic and requests are logged, including malicious or suspicious activities. This data is crucial for security analysis, incident response, and compliance audits.
Remediation Steps:
Identify AWS WAFv2 Regional and Global ACLs:
aws wafv2 list-web-acls
Enable Logging on ACLs:
Verify Logging Configuration:
Periodically Monitor Logs:
Troubleshooting Steps:
Issue: Logging is not enabled on ACLs
Confirm AWS WAFv2 version:
Check IAM permissions:
Review CloudWatch Logs and Kinesis Firehose configuration:
Validate ACL associations:
Check for region-specific limitations:
Review AWS WAFv2 documentation and forums:
Code:
No specific code is required for this rule. It involves enabling logging through the AWS WAFv2 management console and configuring the appropriate settings for the logging destination.