Skip to main content

💼 [APIGateway.1] API Gateway REST and WebSocket API execution logging should be enabled

  • Contextual name: 💼 [APIGateway.1] API Gateway REST and WebSocket API execution logging should be enabled

  • ID: /frameworks/aws-fsbp-v1.0.0/api-gateway/01

  • Located in: 💼 API Gateway

Description

API Gateway REST or WebSocket API stages should have relevant logs enabled. API Gateway REST and WebSocket API execution logging provides detailed records of requests made to API Gateway REST and WebSocket API stages. The stages include API integration backend responses, Lambda authorizer responses, and the requestId for AWS integration endpoints.

Similar

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 NIST SP 800-53 Revision 5 → 💼 AC-4(26) Information Flow Enforcement _ Audit Filtering Actions9
💼 NIST SP 800-53 Revision 5 → 💼 AU-2 Event Logging417
💼 NIST SP 800-53 Revision 5 → 💼 AU-3 Content of Audit Records31328
💼 NIST SP 800-53 Revision 5 → 💼 AU-6(3) Audit Record Review, Analysis, and Reporting _ Correlate Audit Record Repositories8
💼 NIST SP 800-53 Revision 5 → 💼 AU-6(4) Audit Record Review, Analysis, and Reporting _ Central Review and Analysis8
💼 NIST SP 800-53 Revision 5 → 💼 AU-10 Non-repudiation57
💼 NIST SP 800-53 Revision 5 → 💼 AU-12 Audit Record Generation44765
💼 NIST SP 800-53 Revision 5 → 💼 CA-7 Continuous Monitoring610
💼 NIST SP 800-53 Revision 5 → 💼 SC-7(9) Boundary Protection _ Restrict Threatening Outgoing Communications Traffic14
💼 NIST SP 800-53 Revision 5 → 💼 SI-7(8) Software, Firmware, and Information Integrity _ Auditing Capability for Significant Events8

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS API Gateway API Execution Logging in CloudWatch is not enabled 🟢1🟢 x6

Internal Rules

RulePoliciesFlags
✉️ dec-x-2ac6c3021