Ensure logging is activated on AWS WAFv2 regional and global web access control lists.
Rule | Logging should be enabled on AWS WAFv2 regional and global web access control list (ACLs) |
Framework | HIPAA |
Severity | ✔ Low |
Rule Description
The rule requires you to enable logging on AWS WAFv2 regional and global web access control lists (ACLs) for HIPAA compliance. This ensures that all web traffic access attempts are logged, allowing for monitoring, auditing, and analysis of potential security events.
Enabling logging on AWS WAFv2 regional and global ACLs improves the visibility and traceability of web traffic, aiding in identifying potential threats, detecting anomalies, and investigating security incidents. This supports compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations for protecting sensitive healthcare data.
Troubleshooting Steps (if any)
There may be some common issues encountered when enabling logging on AWS WAFv2 ACLs. Here are some troubleshooting steps to follow:
Missing IAM Permissions: Ensure that the IAM user or role used to enable logging has the necessary permissions. It should have the
wafv2:UpdateLoggingConfiguration
permission for the desired WAFv2 ACLs.Wrong ACL Configuration: Verify that the correct regional and global ACLs are selected for logging. Double-check the ACL identifiers and their associated regions.
S3 Bucket Permissions: Ensure that the S3 bucket where logs are stored has the appropriate permissions. The IAM user or role should possess
s3:PutObject
and s3:CreateBucket
permissions on the target bucket.Logging Capacity: Verify that the S3 bucket has sufficient capacity to accommodate the logs generated by the ACLs. If necessary, increase the bucket size or configure log rotation policies.
Log Delivery Interval: Check the log delivery interval to ensure that it meets your compliance requirements. Adjust the interval as necessary, considering the impact on log size, S3 costs, and real-time monitoring needs.
Necessary Codes (if any)
aws wafv2 update-logging-configuration \ --resource-arn <ACL_ARN> \ --logging-configuration '{"LogDestinationConfigs": ["<S3_BUCKET_ARN>"]}'
Replace
<ACL_ARN>
with the ARN (Amazon Resource Name) of the ACL to enable logging on, and <S3_BUCKET_ARN>
with the ARN of the target S3 bucket where logs will be stored.Step-by-Step Guide for Remediation
Follow these steps to enable logging on AWS WAFv2 regional and global ACLs for HIPAA compliance:
Sign in to the AWS Management Console: Go to the AWS Management Console (https://console.aws.amazon.com/) and sign in using your IAM user or role credentials.
Open the AWS WAFv2 Console: Navigate to the AWS WAF & Shield service by searching for "WAF & Shield" in the AWS Management Console search bar. Click on the "AWS WAF & Shield" option from the suggestions.
Select the desired ACL: In the WAF & Shield dashboard, choose the desired WAFv2 ACL (either regional or global) for which you want to enable logging.
Click on "Logging & monitoring": In the selected ACL's overview page, click on the "Logging & monitoring" tab.
Enable logging: Under "Logging Configuration," click on the "Edit" button.
Specify the S3 bucket: In the "S3 Bucket" field, provide the name or ARN of the S3 bucket where you want to store the logs. Ensure that the bucket exists and has the necessary permissions.
Save the configuration: Click on the "Save" button to enable logging for the ACL.
Verify logging status: After saving the logging configuration, ensure that the "Logging status" changes to "Enabled."
Repeat for other ACLs: If necessary, repeat the steps above for other regional or global ACLs that need logging enabled.
Once logging is enabled, the web access attempts on the specified ACLs will be logged and stored in the designated S3 bucket for further analysis and compliance purposes.
Note: Ensure that you closely monitor the S3 bucket size, log delivery interval, and permissions to maintain HIPAA compliance and minimize any potential security risks.