Ensure that your Amazon Application Load Balancers (ALBs) have the Access Logging feature enabled for security, troubleshooting, and audit purposes.
This rule can help you with the following compliance standards:
- PCI
- GDPR
- APRA
- MAS
- NIST4
For further details on compliance standards supported by Conformity, see here.
This rule can help you work with the AWS Well-Architected Framework.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
After you enable and configure access logging for your Application Load Balancers (ALBs), the log files will be delivered to the S3 bucket of your choice. The log files contain data about each HTTP/HTTPS request processed by the load balancer, data that can be extremely useful for analyzing traffic patterns, implementing protection plans, and identifying and troubleshooting security issues.
Audit
To determine if access logging is enabled for your Application Load Balancers (ALBs), perform the following operations:
Remediation / Resolution
To enable access logging for your Amazon Application Load Balancers (ALBs), perform the following operations:
References
- AWS Documentation
- Elastic Load Balancing features
- Elastic Load Balancing FAQs
- Application Load Balancers
- Monitor Your Application Load Balancers
- Access Logs for Your Application Load Balancer
- AWS Command Line Interface (CLI) Documentation
- elbv2
- describe-load-balancers
- describe-load-balancer-attributes
- modify-load-balancer-attributes
- s3api
- create-bucket
- put-bucket-policy
- CloudFormation Documentation
- Elastic Load Balancing V2 resource type reference
- Terraform Documentation
- AWS Provider