This rule requires enabling logging for ELB application and classic load balancers.
Rule | ELB application and classic load balancer logging should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description: ELB Application and Classic Load Balancer Logging for NIST 800-53 Revision 5
The NIST 800-53 Revision 5 is a set of security and privacy controls for federal information systems and organizations. As per the NIST guidelines, it is necessary to enable logging for Elastic Load Balancer (ELB) Application and Classic Load Balancer in order to monitor and analyze the traffic and security events.
Troubleshooting Steps:
Necessary Code:
There is no specific code required to enable logging for ELB Application and Classic Load Balancer. However, it can be achieved through the AWS Management Console or CLI commands.
Step-by-step Guide:
Enable Logging using AWS Management Console:
Enable Logging using CLI Commands:
aws elbv2 modify-load-balancer-attributes --load-balancer-arn <ELB_ARN> --attributes "Key=access_logs.s3.enabled,Value=true" "Key=access_logs.s3.bucket,Value=<BUCKET_NAME>" "Key=access_logs.s3.prefix,Value=<PREFIX>"
aws elb modify-load-balancer-attributes --load-balancer-name <ELB_NAME> --load-balancer-attributes "[]{\"Key\":\"accessLog\", \"Value\":\"Enabled\"}"
Note: Replace
<ELB_ARN>
with the ARN (Amazon Resource Name) of the ELB Application Load Balancer, <BUCKET_NAME>
with the desired S3 bucket name, <PREFIX>
with the desired log file prefix, and <ELB_NAME>
with the name of the Classic Load Balancer.Once enabled, the ELB Application and Classic Load Balancer will start logging the relevant access logs to the specified location, allowing you to monitor and analyze the traffic and security events as per the NIST 800-53 Revision 5 guidelines.