π AWS VPC Flow Logs are not enabled π’
- Contextual name: π Flow Logs are not enabled π’
- ID:
/ce/ca/aws/vpc/flow-logs
- Located in: π AWS VPC
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
RELIABILITY
Similar Policiesβ
- AWS Security Hub
- [[EC2.6] VPC flow logging should be enabled in all VPCs]([EC2.6] VPC flow logging should be enabled in all VPCs (https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-6)]
- Cloud Conformity
- Internal
dec-x-9c041667
Similar Internal Rulesβ
Rule | Policies | Flags |
---|---|---|
βοΈ dec-x-9c041667 | 1 |
Logicβ
- π§ prod.logic.yaml π π’
- π AWS VPC
- π§ͺ test-data.json
Descriptionβ
Descriptionβ
VPC Flow Logs is a feature that enables you to capture information about the IP traffic going to and from network interfaces in your VPC. After you've created a flow log, you can view and retrieve its data in Amazon CloudWatch Logs. It is recommended that VPC Flow Logs be enabled for packet "Rejects" for VPCs.
Rationaleβ
VPC Flow Logs provide visibility into network traffic that traverses the VPC and can be used to detect anomalous traffic or insight during security workflows.
Impactβ
By default, CloudWatch Logs will store Logs indefinitely unless a specific retention period is defined for the log group. When choosing the number of days to retain, keep in mind the average days it takes an organization to realize they have been breached is 210 days (at the time of this writing). Since additional time is required to research a breach, a minimum 365 day retention policy allows time for detection and research. You may also wish to archive the logs to a cheaper storage service rather than simply deleting them. See the following AWS resource to manage CloudWatch Logs retention periods:
... see more
Remediationβ
Remediationβ
Using AWS CloudFormationβ
- CloudFormation template (YAML):
Note: The IAM role used in
DeliverLogsPermissionArn
must exist before deploying this template.AWSTemplateFormatVersion: '2010-09-09'
Description: Enables flow logging for rejected traffic on a specified VPC, publishing to CloudWatch Logs.
Parameters:
VPCId:
Type: String
Description: ID of the existing VPC
LogGroupName:
Type: String
Default: /vpc/flow-logs
FlowLogRoleArn:
Type: String
Description: >
ARN of an existing IAM role that grants permission to publish flow logs to CloudWatch Logs.
Resources:
VPCFlowLog:
Type: AWS::EC2::FlowLog
Properties:
ResourceId: !Ref VPCId
ResourceType: VPC
TrafficType: REJECT
DeliverLogsPermissionArn: !Ref FlowLogRoleArn
LogGroupName: !Ref LogGroupName
LogDestinationType: cloud-watch-logsFrom Consoleβ
- Sign into the management console.
- Select
Services
thenVPC
.- In the left navigation pane, select
Your VPCs
.- Select a VPC.
... see more