Ensure VPC flow logs are enabled for high security compliance.
Rule | VPC flow logs should be enabled |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ High |
VPC Flow Logs for NIST Cybersecurity Framework (CSF) v1
Description:
Enabling VPC Flow Logs is a crucial step in aligning your AWS infrastructure with the NIST Cybersecurity Framework (CSF) version 1. VPC Flow Logs capture network traffic information within your Virtual Private Cloud (VPC), providing valuable insights into traffic patterns, allowing for threat analysis, and supporting incident response activities. This rule ensures that VPC Flow Logs are enabled, promoting visibility and aiding in security monitoring within your AWS environment.
Troubleshooting Steps (if needed):
If you encounter any issues while enabling VPC Flow Logs, follow the troubleshooting steps below:
Necessary Codes (if applicable):
No specific codes are required to enable VPC Flow Logs, as it can be done directly through the AWS Management Console or via CLI commands.
Step-by-step Guide:
Enabling VPC Flow Logs through AWS Management Console:
Enabling VPC Flow Logs through AWS Command Line Interface (CLI):
aws ec2 create-flow-logs --resource-type VPC --resource-ids <VPC_ID> --traffic-type ALL --log-group-name <LOG_GROUP_NAME> --deliver-logs-permission-arn <IAM_ROLE_ARN>
Replace the placeholders
<VPC_ID>
, <LOG_GROUP_NAME>
, and <IAM_ROLE_ARN>
with the respective values for your setup.
4. Verify the command output for successful creation of VPC Flow Logs.Conclusion:
Enabling VPC Flow Logs in alignment with the NIST Cybersecurity Framework (CSF) version 1 helps to enhance the security and visibility of your AWS environment. By following the provided step-by-step guide, you can seamlessly enable VPC Flow Logs either through the AWS Management Console or the AWS Command Line Interface (CLI).