This rule specifies that VPC flow logs must be enabled to ensure system and information integrity.
Rule | VPC flow logs should be enabled |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description:
VPC flow logs should be enabled for compliance with the NIST 800-53 Revision 5 security standard. VPC flow logs provide visibility into the network traffic within your Amazon Virtual Private Cloud (VPC). Enabling VPC flow logs allows you to capture information about all traffic going to and from network interfaces in your VPC, which can be useful for various security and troubleshooting purposes.
Troubleshooting Steps:
If VPC flow logs are not enabled or not functioning properly, you can follow these troubleshooting steps:
Verify VPC Flow Log Status:
Check IAM Role and Permissions:
Verify CloudWatch Log Group:
Check Network ACL and Security Group:
Verify S3 Bucket Permissions:
Validate VPC Configuration:
Necessary Codes:
If you are creating a flow log through AWS CLI or AWS SDK, you can use the following AWS CLI command as an example:
aws ec2 create-flow-logs --resource-ids <vpc-id> --traffic-type ALL --log-group-name <log-group-name> --deliver-logs-permission-arn <role-arn> --region <region>
Ensure to replace
<vpc-id>
with the actual ID of your VPC, <log-group-name>
with the desired CloudWatch log group name, <role-arn>
with the IAM role ARN for the flow logs, and <region>
with the appropriate AWS region.Step-by-Step Remediation Guide:
To enable VPC flow logs for compliance with NIST 800-53 Revision 5, follow these step-by-step instructions:
By following these steps, you can enable VPC flow logs and meet the compliance requirements of NIST 800-53 Revision 5.