This rule requires archiving GuardDuty findings for compliance.
Rule | GuardDuty findings should be archived |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description:
This rule mandates that all GuardDuty findings should be archived to align with the requirements set forth by the National Institute of Standards and Technology (NIST) 800-53 Revision 5. By archiving findings, organizations can ensure compliance with security guidelines and maintain an audit trail for future investigations or reference purposes.
Troubleshooting Steps:
If you encounter any issues while implementing this rule, consider the following troubleshooting steps:
Relevant Code:
There is no specific code associated with this rule; however, it requires configuration changes in the AWS Management Console or by using the AWS Command Line Interface (CLI).
Remediation Steps:
Follow these steps to remediate the rule and archive GuardDuty findings for NIST 800-53 Revision 5 compliance:
AWS Management Console:
AWS CLI:
<BUCKET_NAME>
with the name of the desired S3 bucket:
aws guardduty update-organization-configuration --finding-publishing-frequency BATCH --auto-enable --data-sources.s3Logs.status ENABLED --data-sources.s3Logs.s3BucketName <BUCKET_NAME>
This command should return the updated organization configuration details, including the S3 bucket for finding archival.aws guardduty get-organization-configuration
Conclusion:
By following the steps outlined above, you can ensure that all GuardDuty findings are properly archived to comply with the NIST 800-53 Revision 5 requirements. Archiving findings provides a centralized location for storing and analyzing security events, aiding in post-incident analysis and compliance audits.