More Info:

Ensure audit logging is enabled for opensearch cluster

Risk Level

Medium

Address

Operational Maturity, Reliability, Security

Compliance Standards

CBP,GDPR,HIPAA,ISO27001,SEBI,RBI_UCB

Triage and Remediation

Remediation

To remediate the misconfiguration of Opensearch Audit Logging not being enabled in AWS OpenSearch, follow these steps using the AWS Management Console:

  1. Navigate to the Amazon OpenSearch Service Console: Go to the AWS Management Console and search for “OpenSearch Service” in the services search bar. Click on the service to open the Amazon OpenSearch Service Console.

  2. Select the Domain: From the list of domains, select the domain for which you want to enable Audit Logging.

  3. Enable Audit Logging: In the domain dashboard, click on the “Configure access and security” tab in the left-hand navigation menu.

  4. Edit the Advanced Security Settings: Under the “Advanced security settings” section, click on the “Edit” button.

  5. Enable Audit Logs: Scroll down to the “Logging” section and toggle the switch to enable “Log publishing” for audit logs.

  6. Configure Log Publishing: Configure the destination for the audit logs. You can choose to send logs to Amazon CloudWatch Logs, Amazon S3, or both.

  7. Save Changes: Click on the “Save” button to apply the changes and enable Audit Logging for the OpenSearch domain.

  8. Verify Audit Logging: To verify that Audit Logging is enabled, you can check the status in the domain dashboard or navigate to the chosen destination (CloudWatch Logs or S3) to ensure that the audit logs are being published successfully.

By following these steps, you have successfully remediated the misconfiguration of Opensearch Audit Logging not being enabled in AWS OpenSearch.