Cloud Incident Response

  • 1.  AWS Logging strategies - Minimum Requirements for Security Logs onboarding

    Posted Oct 19, 2023 04:18:00 PM

    Dear community,

    Effective security incident response depends on adequate logging. If you have the proper logs and can query them, you can respond more rapidly and effectively to security events. If a security event occurs, you can use various log sources to validate what happened and understand the scope. Then, you can use the results of your analysis to take remediation actions. 

    Is there any document that outlines the minimum log requirements, that all services within an AWS account must send to the Security Operation Center?

    Regards,



    ------------------------------
    Panagiotis Chavariotis
    ------------------------------


  • 2.  RE: AWS Logging strategies - Minimum Requirements for Security Logs onboarding

    Posted Jun 27, 2024 06:52:00 AM

    Hi @Panagiotis Chavariotis , I am little late joiner to this community but Here us my advice and experience . First of All we must follow the basics of cloud security approach using Preventive , Detective ,Corrective methodology using the following mechanism Identify --> Protect --> Detect -->Respond-> Recover. 

    All these mechanism need some kind of logging capability which can be provided by various services. However to answer your original question of minimum log requirements , i would say it depends on the the need but in my opinion enabling he cloud trail logs would be the bare minimum and along with it enabling the guard duty,inspector and config would be my next options .Nevertheless , Only log the events collection would be futile without the proper monitoring and thereat intelligence practices applied .

    Regards,

    Raj Pandey 



    ------------------------------
    raj pandey
    cloud architect
    PROSIEBEN
    ------------------------------



  • 3.  RE: AWS Logging strategies - Minimum Requirements for Security Logs onboarding

    Posted Feb 21, 2025 06:08:00 AM

    This depends on your threat model, but a good practical reference is available here: https://aws.amazon.com/blogs/security/logging-strategies-for-security-incident-response/



    ------------------------------
    Ewaldo S Hiras
    Independent Researcher
    GGS
    ------------------------------



  • 4.  RE: AWS Logging strategies - Minimum Requirements for Security Logs onboarding

    Posted Apr 21, 2025 06:56:00 PM

    The below logs need to be collected 
    Logs of all API calls made to AWS services.
    Logs of S3 object-level operations and Lambda function invocations.
    unusual API activity patterns.
    Records of configuration changes to AWS resources.
    logs of requests made to CloudFront distributions
    Logs of requests made to S3 buckets.
    Logs of requests sent to ELB, including client IP addresses and request paths.

    Also, need to ensure that logs are retained for an appropriate period to meet compliance requirements



    ------------------------------
    Jayesh Dalmet
    Sr. Network Security Engineer - L4
    NetApp
    ------------------------------



  • 5.  RE: AWS Logging strategies - Minimum Requirements for Security Logs onboarding

    Posted Apr 22, 2025 07:13:00 AM

    For minimum AWS security logs onboarding, enable CloudTrail (all regions), AWS Config, VPC Flow Logs, and CloudWatch. Centralize logs, set appropriate retention, and secure access. This forms the baseline for visibility and compliance.



    ------------------------------
    Rohit Sansiya
    Project Engineer
    Information Security Services (ISS-SANS)
    Centre for Development of Advanced Computing(C-DAC), Hyderabad
    Mobile: 8765232907
    ------------------------------



  • 6.  RE: AWS Logging strategies - Minimum Requirements for Security Logs onboarding

    Posted Apr 21, 2025 09:09:00 PM

    There's no single universal AWS document that prescribes "minimum log requirements for all services" to send to SIEM/SOC.

    Start with AWS CloudTrail-enable management events, data events, and insights based on your business needs and the AWS services you use. While ALB access logs can be valuable, they may be redundant if you're already using a proxy or web server that captures similar traffic. Also, enable Amazon GuardDuty to monitor your environment for suspicious network activity and potential threats.



    ------------------------------
    Suresh Kumar Akkemgari
    ------------------------------