Skip to main content

💼 [GuardDuty.1] GuardDuty should be enabled

  • ID: /frameworks/aws-fsbp-v1.0.0/guardduty/01

Description

It is highly recommended that you enable GuardDuty in all supported AWS Regions. Doing so allows GuardDuty to generate findings about unauthorized or unusual activity, even in Regions that you do not actively use. This also allows GuardDuty to monitor CloudTrail events for global AWS services such as IAM.

Similar

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 NIST SP 800-53 Revision 5 → 💼 AC-2(12) Account Management _ Account Monitoring for Atypical Usage1no data
💼 NIST SP 800-53 Revision 5 → 💼 AU-6(1) Audit Record Review, Analysis, and Reporting _ Automated Process Integration13no data
💼 NIST SP 800-53 Revision 5 → 💼 AU-6(5) Audit Record Review, Analysis, and Reporting _ Integrated Analysis of Audit Records2no data
💼 NIST SP 800-53 Revision 5 → 💼 CA-7 Continuous Monitoring613no data
💼 NIST SP 800-53 Revision 5 → 💼 CM-8(3) System Component Inventory _ Automated Unauthorized Component Detection1no data
💼 NIST SP 800-53 Revision 5 → 💼 RA-3(4) Risk Assessment _ Predictive Cyber Analytics1no data
💼 NIST SP 800-53 Revision 5 → 💼 SA-8(19) Security and Privacy Engineering Principles _ Continuous Protection1no data
💼 NIST SP 800-53 Revision 5 → 💼 SA-8(21) Security and Privacy Engineering Principles _ Self-analysis1no data
💼 NIST SP 800-53 Revision 5 → 💼 SA-8(25) Security and Privacy Engineering Principles _ Economic Security1no data
💼 NIST SP 800-53 Revision 5 → 💼 SA-11(1) Developer Testing and Evaluation _ Static Code Analysis1no data
💼 NIST SP 800-53 Revision 5 → 💼 SA-11(6) Developer Testing and Evaluation _ Attack Surface Reviews1no data
💼 NIST SP 800-53 Revision 5 → 💼 SA-15(2) Development Process, Standards, and Tools _ Security and Privacy Tracking Tools1no data
💼 NIST SP 800-53 Revision 5 → 💼 SA-15(8) Development Process, Standards, and Tools _ Reuse of Threat and Vulnerability Information1no data
💼 NIST SP 800-53 Revision 5 → 💼 SC-5 Denial-of-service Protection312no data
💼 NIST SP 800-53 Revision 5 → 💼 SC-5(1) Denial-of-service Protection _ Restrict Ability to Attack Other Systems1no data
💼 NIST SP 800-53 Revision 5 → 💼 SC-5(3) Denial-of-service Protection _ Detection and Monitoring1no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-3(8) Malicious Code Protection _ Detect Unauthorized Commands6no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-4 System Monitoring25110no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-4(1) System Monitoring _ System-wide Intrusion Detection System1no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-4(2) System Monitoring _ Automated Tools and Mechanisms for Real-time Analysis1no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-4(4) System Monitoring _ Inbound and Outbound Communications Traffic12no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-4(5) System Monitoring _ System-generated Alerts2no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-4(13) System Monitoring _ Analyze Traffic and Event Patterns1no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-4(22) System Monitoring _ Unauthorized Network Services1no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-4(25) System Monitoring _ Optimize Network Traffic Analysis1no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-20 Tainting2no data
💼 PCI DSS v3.2.1 → 💼 11.4 Use intrusion-detection and/or intrusion-prevention techniques to detect and/or prevent intrusions into the network.19no data
💼 PCI DSS v3.2.1 → 💼 11.5.1 Implement a process to respond to any alerts generated by the change detection solution.1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS GuardDuty is not enabled in all regions🟢1🟢 x6no data