This rule ensures archiving of GuardDuty findings for security
Rule | GuardDuty findings should be archived |
Framework | NIST 800-53 Revision 4 |
Severity | ✔ Medium |
GuardDuty Findings Archival for NIST 800-53 Revision 4
Rule Description:
To comply with NIST 800-53 Revision 4, it is important to archive the findings generated by AWS GuardDuty, a threat detection service. Archiving the findings enables organizations to maintain a historical record of security incidents and comply with regulatory requirements.
Troubleshooting Steps:
Code (AWS CLI commands):
Step 1: Enable GuardDuty (if not already enabled)
$ aws guardduty create-detector --enable
Step 2: Create an S3 bucket for archival
$ aws s3api create-bucket --bucket <bucket-name> --region <region>
Step 3: Configure GuardDuty to archive findings to S3 bucket
$ aws guardduty update-configuration --detector-id <detector-id> --finding-publishing-frequency BATCH --data-sources.s3Logs.enabled true --data-sources.s3Logs.s3BucketArn arn:aws:s3:::<bucket-name>
Note: Replace
<bucket-name>
with the name of the S3 bucket created in step 2, and <region>
with the desired AWS region. Also, make sure to replace <detector-id>
with the ID of your GuardDuty detector.Remediation Steps:
To archive GuardDuty findings for NIST 800-53 Revision 4 compliance, follow the steps below:
Enable GuardDuty:
Create an S3 bucket:
Configure GuardDuty to archive findings:
<bucket-name>
and <detector-id>
with the appropriate values.Verification:
By following these steps, you can archive GuardDuty findings and comply with the NIST 800-53 Revision 4 requirement.