More Info:

Subnet flow logs record all traffic flowing in to and out of a Subnet. These logs are critical for auditing and review after security incidents.

Risk Level

Low

Address

Security

Compliance Standards

HIPAA

Triage and Remediation

Remediation

To remediate the misconfiguration of not having Flow Logs enabled on a subnet for AWS Security Groups, you can follow these step-by-step instructions using the AWS Management Console:

  1. Sign in to the AWS Management Console: Go to https://aws.amazon.com/ and sign in to your AWS account.

  2. Navigate to VPC Dashboard: Click on the “Services” dropdown menu at the top left corner, then select “VPC” under the Networking & Content Delivery section.

  3. Select the VPC: In the VPC Dashboard, locate and click on the VPC that contains the subnet where you want to enable Flow Logs.

  4. Select the Subnet: In the left-hand menu, click on “Subnets” to view all the subnets within the selected VPC. Locate and select the specific subnet where you want to enable Flow Logs by clicking on the checkbox next to the subnet.

  5. Enable Flow Logs: With the subnet selected, click on the “Actions” dropdown menu above the subnets list, and then select “Create flow log” from the options.

  6. Configure Flow Logs: In the “Create flow log” wizard, you will need to configure the following:

    • Filter: Choose the type of traffic you want to capture in the flow logs (e.g., All traffic, Accepted traffic, Rejected traffic).
    • Destination: Select the destination where you want to store the flow logs (e.g., CloudWatch Logs, S3).
    • IAM Role: If you haven’t already set up the necessary IAM role for Flow Logs, you may need to create a new IAM role or choose an existing one that grants the required permissions.
  7. Review and Create: Review the configuration settings to ensure they are correct, then click on the “Create flow log” button to enable Flow Logs on the selected subnet.

  8. Verify: Once the Flow Logs are enabled, you can verify that they are working correctly by checking the designated destination (e.g., CloudWatch Logs or S3) for log data.

By following these steps, you can successfully remediate the misconfiguration of not having Flow Logs enabled on a subnet for AWS Security Groups using the AWS Management Console.

Additional Reading: