Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Enable VPC Flow Logs Rule

This rule ensures VPC flow logs are enabled in order to track network traffic and security events.

RuleVPC flow logs should be enabled
FrameworkNIST 800-53 Revision 5
Severity
High

Rule Description:

VPC flow logs should be enabled for NIST 800-53 Revision 5. VPC flow logs capture information about the IP traffic going to and from network interfaces within a Virtual Private Cloud (VPC).

Enabling VPC flow logs for NIST 800-53 Revision 5 provides valuable insight into network traffic, allowing organizations to monitor and analyze network security, troubleshoot issues, and meet compliance requirements.

Troubleshooting Steps:

If VPC flow logs are not enabled or not working correctly, follow the steps below for troubleshooting:

  1. 1.

    Verify Flow Log Configuration: Check if flow logs are enabled for the correct VPC or subnet. Ensure that the log destination is properly configured, such as an Amazon S3 bucket, CloudWatch Logs, or a third-party logging solution.

  2. 2.

    Verify IAM Permissions: Ensure that the IAM role associated with the flow log has the necessary permissions to write logs to the chosen log destination. The role should have appropriate permissions to access the chosen storage service or logging solution.

  3. 3.

    Check Log Delivery: If flow logs are configured to deliver logs to an Amazon S3 bucket, verify if the bucket exists, and the IAM role has proper permissions to write logs to the bucket. If using CloudWatch Logs, check if the log group and log stream are correctly set up.

  4. 4.

    Review Network ACLs and Security Groups: Ensure that any network ACLs or security groups associated with the VPC or subnet allow outbound traffic to the log destination. Check if any explicit deny rules are blocking the delivery of flow logs.

  5. 5.

    Verify Subnet and Network Interface Association: Make sure that network interfaces in the VPC or subnet have the appropriate association with the flow logs. Check if the interfaces are correctly tagged, and any network interface changes are immediately associated with the flow logs.

  6. 6.

    Check VPC Peering or VPN Connections: If the VPC has peering connections or VPN connections to other networks, ensure that the necessary routes and permissions are in place for flow logs. Check if the peered VPCs or VPN connections support flow log delivery.

  7. 7.

    Review Flow Log Settings: Double-check the settings of the flow logs to ensure they capture the desired information. Verify if the log format, retention period, and log attributes align with the requirements of NIST 800-53 Revision 5.

Neccessary Codes:

No specific codes are required for enabling VPC flow logs for NIST 800-53 Revision 5. The configuration can be done through the AWS Management Console, AWS CLI, or AWS SDKs.

Step-by-Step Guide for Remediation:

Follow the steps below to enable VPC flow logs for NIST 800-53 Revision 5:

  1. 1.

    Open the AWS Management Console and navigate to the Amazon VPC service.

  2. 2.

    Select the desired VPC for which you want to enable flow logs.

  3. 3.

    From the navigation panel, choose "Flow Logs."

  4. 4.

    Click on the "Create Flow Log" button.

  5. 5.

    Configure the following parameters:

    • Choose the destination for the flow logs (e.g., S3 bucket, CloudWatch Logs).
    • Specify the IAM role that has the necessary permissions to deliver logs.
    • Choose the desired log format and log record format.
    • Set the retention period for the flow logs.
    • Select the appropriate log level and traffic type to capture.
  6. 6.

    Click on the "Create" button to enable the flow logs.

  7. 7.

    Verify the flow log status to ensure it is active and properly delivering logs to the chosen destination.

  8. 8.

    Monitor the flow logs for network traffic information, security analysis, and compliance adherence.

By following these steps, you can enable VPC flow logs for NIST 800-53 Revision 5 and leverage them to enhance network security, troubleshooting, and compliance.

Is your System Free of Underlying Vulnerabilities?
Find Out Now