Skip to main content

💼 [EC2.6] VPC flow logging should be enabled in all VPCs

  • Contextual name: 💼 [EC2.6] VPC flow logging should be enabled in all VPCs
  • ID: /frameworks/aws-fsbp-v1.0.0/ec2/06
  • Located in: 💼 Elastic Compute Cloud (EC2)

Description

With the VPC Flow Logs feature, you can capture information about the IP address traffic going to and from network interfaces in your VPC. After you create a flow log, you can view and retrieve its data in CloudWatch Logs. To reduce cost, you can also send your flow logs to Amazon S3.

By default, the record includes values for the different components of the IP address flow, including the source, destination, and protocol.

Similar

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 NIST SP 800-53 Revision 5 → 💼 AC-4(26) Information Flow Enforcement _ Audit Filtering Actions9
💼 NIST SP 800-53 Revision 5 → 💼 AU-2 Event Logging417
💼 NIST SP 800-53 Revision 5 → 💼 AU-3 Content of Audit Records31328
💼 NIST SP 800-53 Revision 5 → 💼 AU-6(3) Audit Record Review, Analysis, and Reporting _ Correlate Audit Record Repositories8
💼 NIST SP 800-53 Revision 5 → 💼 AU-6(4) Audit Record Review, Analysis, and Reporting _ Central Review and Analysis8
💼 NIST SP 800-53 Revision 5 → 💼 AU-12 Audit Record Generation44765
💼 NIST SP 800-53 Revision 5 → 💼 CA-7 Continuous Monitoring610
💼 NIST SP 800-53 Revision 5 → 💼 SI-7(8) Software, Firmware, and Information Integrity _ Auditing Capability for Significant Events8
💼 PCI DSS v3.2.1 → 💼 10.3.3 Date and time.1
💼 PCI DSS v3.2.1 → 💼 10.3.4 Success or failure indication.1
💼 PCI DSS v3.2.1 → 💼 10.3.5 Origination of event.1
💼 PCI DSS v3.2.1 → 💼 10.3.6 Identity or name of affected data, system component, or resource.1

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS VPC Flow Logs are not enabled 🟢1🟠 x1, 🟢 x5

Internal Rules

RulePoliciesFlags
✉️ dec-x-9c0416671