Ensure that your Amazon Classic Load Balancers have the Access Logging feature enabled for security, troubleshooting, and audit purposes.
This rule can help you with the following compliance standards:
- PCI
- HIPAA
- APRA
- MAS
- NIST4
For further details on compliance standards supported by Conformity, see here.
This rule can help you work with the AWS Well-Architected Framework.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
After you enable and configure access logging for your Classic Load Balancers, the log files will be delivered to the S3 bucket of your choice. The log files contain data about each HTTP(S) request processed by the load balancer, data that can be extremely useful for analyzing traffic patterns, implementing protection plans, and identifying and troubleshooting security issues.
Audit
To determine if access logging is enabled for your Classic Load Balancers, perform the following operations:
Remediation / Resolution
To enable access logging for your Amazon Classic Load Balancers, perform the following operations:
References
- AWS Documentation
- Elastic Load Balancing FAQs
- Configure your Classic Load Balancer
- Monitor your Classic Load Balancer
- Access logs for your Classic Load Balancer
- Enable access logs for your Classic Load Balancer
- AWS Command Line Interface (CLI) Documentation
- elb
- describe-load-balancers
- describe-load-balancer-attributes
- modify-load-balancer-attributes
- s3api
- create-bucket
- put-bucket-policy
- CloudFormation Documentation
- AWS::ElasticLoadBalancing::LoadBalancer
- Terraform Documentation
- AWS Provider