This rule mandates enabling logging on AWS WAFv2 regional and global web access control lists.
Rule | Logging should be enabled on AWS WAFv2 regional and global web access control list (ACLs) |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Low |
Rule Description:
The rule requires logging to be enabled on AWS Web Application Firewall v2 (WAFv2) for both regional and global web access control lists (ACLs) in accordance with the NIST 800-53 Revision 5 security standard. Enabling logging helps in monitoring and analyzing web traffic, identifying potential security threats, and investigating any security incidents that may occur.
Troubleshooting Steps:
Necessary Code:
There are different ways to enable logging on WAFv2 ACLs depending on your requirements and AWS resources. Here, we will provide sample AWS CLI commands for enabling logging on regional and global ACLs.
Enable Logging on Regional ACL:
aws wafv2 update-web-acl --name <ACL_Name> --scope REGIONAL --id <ACL_ID> --logging-configuration 'LogDestinationConfigs=["arn:aws:logs:<region>:<account_id>:log-group:<log_group_name>:*"]'
Replace the placeholders enclosed in angle brackets (<>) with appropriate values:
<ACL_Name>
: The name of the regional ACL.<ACL_ID>
: The ID of the regional ACL.<region>
: The AWS region where the logs are to be stored.<account_id>
: Your AWS account ID.<log_group_name>
: The name of the CloudWatch Logs group where the logs will be stored.Enable Logging on Global ACL:
aws wafv2 update-web-acl --name <ACL_Name> --scope CLOUDFRONT --id <ACL_ID> --logging-configuration 'LogDestinationConfigs=["arn:aws:logs:<region>:<account_id>:log-group:<log_group_name>:*"]'
Replace the placeholders enclosed in angle brackets (<>) with appropriate values:
<ACL_Name>
: The name of the global ACL.<ACL_ID>
: The ID of the global ACL.<region>
: The AWS region where the logs are to be stored.<account_id>
: Your AWS account ID.<log_group_name>
: The name of the CloudWatch Logs group where the logs will be stored.Step-by-Step Guide for Remediation:
By following the above steps, logging on the AWS WAFv2 regional and global web access control lists will be successfully enabled, ensuring compliance with the NIST 800-53 Revision 5 security requirements.