Ensure API Gateway stage logging is enabled to meet compliance standards.
Rule | API Gateway stage logging should be enabled |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ High |
Rule: API Gateway Stage Logging for NIST CSF v1
Description:
API Gateway is a service that enables you to create, publish, monitor, and secure APIs (Application Programming Interfaces) at any scale. Logging is an essential aspect of API Gateway, as it provides visibility into the API traffic, helps in monitoring and troubleshooting, and enhances security.
To align with the NIST Cybersecurity Framework (CSF) version 1, the logging feature in API Gateway must be enabled for each stage. This ensures that all API traffic and related activities are being logged, allowing for effective analysis and auditing of the system.
Troubleshooting Steps:
Necessary Codes:
No specific codes are required for this rule. However, the AWS CLI commands mentioned in the remediation steps can be used for configuration updates.
Remediation Steps:
Follow these steps to enable API Gateway stage logging for NIST CSF v1:
Once the logging is enabled for the stage, API Gateway will start sending logs to CloudWatch Logs based on the chosen configuration. These logs can then be used for analysis, monitoring, and compliance purposes aligned with the NIST CSF v1.
Note: Make sure you have the necessary permissions to perform these actions in your AWS account.
For more information on enabling API Gateway stage logging, refer to the official AWS documentation.
Remember, enabling logging for API Gateway is an essential security practice that helps meet compliance requirements, enhance visibility, and improve the overall security posture of your API infrastructure.