This rule focuses on enabling GuardDuty for enhanced security measures.
Rule | GuardDuty should be enabled |
Framework | SOC 2 |
Severity | ✔ High |
GuardDuty Enabled for SOC 2
Description
GuardDuty is a threat detection service offered by Amazon Web Services (AWS) that analyzes network traffic and log data within an AWS account. Enabling GuardDuty for SOC 2 ensures that your organization's security posture meets the requirements set forth by the SOC 2 compliance standard. SOC 2 is an auditing procedure designed to ensure that organizations securely manage customer data based on five trust principles: security, availability, processing integrity, confidentiality, and privacy.
By enabling GuardDuty, you can detect potential security threats, activities related to compromised instances, unauthorized access attempts, and various other suspicious activities within your AWS environment. GuardDuty analyzes both AWS CloudTrail logs and VPC Flow Logs to identify potential threats and provides you with detailed findings and insights to help you mitigate risks and strengthen your security posture.
Troubleshooting Steps (if required)
Necessary Codes/Configurations (if applicable)
No specific codes or configurations are required to enable GuardDuty. However, you need to have an AWS account with the necessary permissions to enable GuardDuty and configure it as per your requirements.
Step-by-Step Guide for Remediation
To enable GuardDuty for SOC 2 compliance, follow these steps:
By following these steps, you will ensure that GuardDuty is enabled and operational in line with SOC 2 compliance requirements, enhancing the security posture of your AWS environment.