This rule requires enabling logging for ELB application and classic load balancer for increased security measures.
Rule | ELB application and classic load balancer logging should be enabled |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ High |
Rule Description:
Enabling logging for ELB (Elastic Load Balancer) application and classic load balancers is necessary to comply with NIST 800-171 Revision 2 guidelines. Logging allows for the monitoring and analysis of network traffic, aiding in the detection of any suspicious activities or potential security breaches. By logging the load balancer data, organizations can ensure compliance with NIST standards and enhance their overall security posture.
Troubleshooting Steps (if applicable):
Necessary Codes (if applicable):
No specific codes are required for this rule.
Step-by-Step Guide for Remediation:
Follow the steps below to enable logging for both ELB application and classic load balancers:
Sign in to the AWS Management Console:
Navigate to the EC2 Dashboard:
Select the Load Balancer:
Enable Access Logs:
Configure Logging:
Save Changes:
Verify Logging:
Conclusion:
Enabling logging for ELB application and classic load balancers is crucial to adhere to NIST 800-171 Revision 2 requirements. By following the step-by-step guide provided above, you can successfully enable logging and meet the compliance guidelines. Regularly monitoring the log files in the designated S3 bucket will enhance your organization's cybersecurity posture and help detect any potential security incidents.