Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: GuardDuty should be enabled

This rule dictates that GuardDuty must be enabled for security purposes.

RuleGuardDuty should be enabled
FrameworkNIST Cybersecurity Framework (CSF) v1.1
Severity
High

Rule Description

The GuardDuty service should be enabled in order to meet the requirements of NIST Cybersecurity Framework (CSF) v1. GuardDuty is a managed threat detection service provided by AWS that continuously monitors the AWS environment for any suspicious activities or malicious behavior. By enabling GuardDuty, you enhance your security posture and gain insights into potential security risks and threats within your environment.

Troubleshooting Steps

If you encounter any issues while enabling GuardDuty for NIST CSF v1, follow these troubleshooting steps:

Step 1: Ensure GuardDuty is supported in your AWS region:

  • Check the AWS Region Table to verify that GuardDuty is available in your desired region. If not, consider using AWS services that provide similar functionality in your region.

Step 2: Verify necessary IAM permissions:

  • Ensure that you have the necessary IAM permissions to enable GuardDuty. You need the "guardduty:CreateDetector" permission to create a GuardDuty detector.
  • If you don't have the required permissions, contact your AWS account administrator or security team to grant you the necessary access.

Step 3: Check GuardDuty service quotas:

  • GuardDuty has certain service quotas that limit the number of detectors you can create per AWS account per region. Ensure that you haven't exceeded these quotas.
  • If you have reached the quota limit, you will need to request a quota increase from AWS Support.

Step 4: Verify GuardDuty settings:

  • Double-check your GuardDuty settings to ensure that you have selected the appropriate AWS accounts and regions for monitoring.
  • Ensure that you have configured email or SNS (Simple Notification Service) notifications to receive alerts when GuardDuty detects potential threats.

Necessary Code

There is no specific code required for enabling GuardDuty as it is a managed service provided by AWS. However, you can configure it using the AWS Management Console, AWS CLI (Command Line Interface), or AWS SDKs (Software Development Kits) based on your preference and requirements.

Step-by-Step Guide for Enabling GuardDuty for NIST CSF v1

Follow the steps below to enable GuardDuty for NIST CSF v1:

Step 1: Access the AWS Management Console:

  • Open your preferred web browser and go to the AWS Management Console.
  • Sign in with your AWS account credentials.

Step 2: Navigate to the GuardDuty service:

  • In the AWS Management Console, search for "GuardDuty" in the AWS services search bar.
  • Click on the "GuardDuty" result to open the GuardDuty service page.

Step 3: Create a new detector:

  • On the GuardDuty service page, click on the "Get Started" button if it is your first time using GuardDuty. Otherwise, click on the "Create detector" button.
  • Select the AWS accounts and regions you want to monitor with GuardDuty.
  • Click on the "Create" button to create a new detector.

Step 4: Configure GuardDuty settings:

  • After creating the detector, you can configure various settings such as threat intelligence, data retention, and publishing findings.
  • Configure these settings based on your requirements and NIST CSF v1 guidelines.

Step 5: Enable email or SNS notifications (optional):

  • To receive alerts and notifications when GuardDuty detects potential threats, you can configure email or SNS notifications.
  • Follow the instructions provided in the GuardDuty documentation to set up notifications.

Step 6: Review and monitor GuardDuty findings:

  • Once GuardDuty is enabled, it will automatically start monitoring your AWS environment for suspicious activity.
  • Regularly review the GuardDuty findings and take appropriate actions to remediate any detected threats or vulnerabilities.

By following these steps, you can successfully enable GuardDuty for NIST Cybersecurity Framework (CSF) v1 and enhance the security of your AWS environment.

Is your System Free of Underlying Vulnerabilities?
Find Out Now