More Info:

This rule checks if Amazon MQ brokers have Amazon CloudWatch audit logging enabled. The rule is NON_COMPLIANT if a broker does not have audit logging enabled.

Risk Level

Low

Address

Monitoring

Compliance Standards

CBP,GDPR,HIPAA,ISO27001,SEBI

Triage and Remediation

Remediation

To remediate the misconfiguration of MQ Brokers having CloudWatch audit logging enabled for AWS Security Groups using the AWS console, follow these steps:

  1. Access AWS Console: Log in to your AWS Management Console using your credentials.

  2. Navigate to Amazon MQ Service: Go to the Amazon MQ service by either searching for it in the AWS services search bar or locating it under the “Messaging & Queueing” section.

  3. Select the MQ Broker: Select the MQ Broker for which you want to remediate the CloudWatch audit logging configuration.

  4. Modify Broker: Click on the “Actions” dropdown menu and select “Modify Broker”.

  5. Update Broker Configuration: In the “Broker Details” section, scroll down to the “Logs” section.

  6. Disable CloudWatch Audit Logging: Locate the “CloudWatch Audit Logging” option and disable it by unchecking the box or selecting “Disabled” from the dropdown menu.

  7. Save Changes: Scroll to the bottom of the page and click on the “Modify” button to save the changes.

  8. Verify Configuration: Once the changes are saved, verify that CloudWatch audit logging is disabled for the MQ Broker by checking the broker’s configuration settings.

By following these steps, you will successfully remediate the misconfiguration of MQ Brokers having CloudWatch audit logging enabled for AWS Security Groups using the AWS console.