More Info:

Checks whether an Application Load Balancer, Amazon CloudFront distributions, Elastic Load Balancer or Elastic IP has AWS Shield protection. It also checks if they have web ACL associated for Application Load Balancer and Amazon CloudFront distributions.

Risk Level

Medium

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the misconfiguration of not having FMS Shield Resource Policy enabled for AWS CloudWatch using the AWS Management Console, follow these steps:

  1. Sign in to the AWS Management Console: Go to https://aws.amazon.com/ and sign in to your AWS account.

  2. Navigate to AWS CloudWatch: Click on the “Services” dropdown at the top of the page, then select “CloudWatch” under the Management & Governance section.

  3. Enable FMS Shield Resource Policy:

    • In the CloudWatch console, click on “Alarms” in the left-hand navigation pane.
    • Click on the alarm that you want to enable FMS Shield Resource Policy for.
    • In the alarm details page, click on the “Actions” dropdown and select “Edit”.
    • Scroll down to the “FMS Shield Resource Policy” section.
    • Click on the toggle button to enable the FMS Shield Resource Policy.
    • Click on the “Save” button to apply the changes.
  4. Verify the FMS Shield Resource Policy is enabled:

    • Once you have enabled the FMS Shield Resource Policy for the alarm, you can verify that it is enabled by checking the alarm details and ensuring that the FMS Shield Resource Policy toggle is set to enabled.

By following these steps, you should be able to remediate the misconfiguration of not having FMS Shield Resource Policy enabled for AWS CloudWatch using the AWS Management Console.