-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Review audit log retention #5078
Comments
CloudWatch logs retention is currently set to 180 days for most logs Line 257 in d50be3b audit_log_retention_days = 180 # FedRAMP mandates 90 days and 30 days for ElasticSearch error logs Line 259 in d50be3b verbose_log_retention_days = 30 [edit @danielsotirhos] |
CloudWatchhttps://aws.amazon.com/cloudwatch/faqs/
Terraform resourceaws_cloudwatch_log_group.retention_in_days Production values$ aws logs describe-log-groups | grep -e logGroupName -e retentionInDays
[Edit (@hannes-ucsc): Determine if error log retention can be extended to 180 days, if the error log is currently populated and what the expected size of 180 days worth of logging is.] [Edit (@dsotirho-ucsc): Response in comment below] [Edit (@dsotirho-ucsc): Created ticket #5557 PR #5558] CloudTrailhttps://docs.aws.amazon.com/awscloudtrail/latest/userguide/best-practices-security.html
Terraform resourceaws_s3_bucket_lifecycle_configuration Production values(no expiration lifecycle policy set on trail bucket) $ aws s3api get-bucket-lifecycle --bucket edu-ucsc-gi-platform-hca-prod-trail.us-east-1
[Edit (@hannes-ucsc): We don't want this storage class transition. We disabled the tag enforcer. Determine what needs to be done in each of our AWS accounts to remove that rule or post evidence that the rule is gone from all buckets in all accounts.] [Edit (@dsotirho-ucsc): There are 16 buckets with the [Edit (@dsotirho-ucsc): Created ticket #5561 to remove the rule from these buckets by explicitly setting no rule in the TF config.] S3https://stackoverflow.com/questions/26891607/s3-default-lifecycle-expiration
Terraform resourceaws_s3_bucket_lifecycle_configuration Production values$ aws s3api get-bucket-lifecycle-configuration --bucket edu-ucsc-gi-platform-hca-prod-storage-prod.us-east-1
[Edit (@hannes-ucsc): File PR to increase retention of non-current object versions in [Edit (@dsotirho-ucsc): Created ticket #5552 PR #5553] SecurityHubhttps://docs.aws.amazon.com/securityhub/latest/userguide/securityhub_limits.html
Terraform resourceaws_cloudwatch_event_rule Production values$ aws events list-rules | grep -i security
GuardDutyhttps://docs.aws.amazon.com/guardduty/latest/ug/guardduty_limits.html
AWS Config
Terraform resourceaws_config_configuration_recorder* *Not currently possibe to set a Production values$ aws configservice describe-retention-configurations
ElasticsearchSee CloudWatch section for retention of log groups VPNSee CloudWatch section for retention of log group GitLab logs(This information pertains to logs stored on the GitLab instance & will need to be updated once #3894 is implemented to forward GitLab logs to Cloudwatch) List of logs managed by logrotate vs svlogd/runit: Log retentionThe default values for logging are being used. GitLab config file: Logging settings default values:
[Edit (@hannes-ucsc): I believe that all these logs are now forwarded to CloudWatch. Please confirm this and link to the relevant ticket(s) and PR(s).] [Edit (@dsotirho-ucsc): Relevant ticket #3894 PR #5187 , comment below lists the GitLab host logs that are now forwarded to CloudWatch.] GitLab job logshttps://docs.gitlab.com/ee/administration/job_logs.html Log locationWhen a job is running: After a job is finished: Log retentionhttps://docs.gitlab.com/ee/administration/job_logs.html#how-to-remove-job-logs
[Edit (@hannes-ucsc): We are OK with retaining job logs in perpetuity until we run into space issues.] |
I added edits with action items directly to @dsotirho-ucsc's comment above. [Edit (@dsotirho-ucsc): Response to action items added as inline edits in comment above.] |
CloudWatch
Yes, there are three log types (INDEX_SLOW_LOGS, SEARCH_SLOW_LOGS, & ES_APPLICATION_LOGS) published from ES to their own CloudWatch log group. While we currently set the retention of the ES_APPLICATION_LOGS (error-logs) to 30 days, the other two log types have a retention set of 180 days.
/aws/aes/domains/azul-index-dev/error-logs - 10 records
Stored bytes:
Code used to fetch the stored bytes
Note:
|
GitLab logsGitLab host logs forwarded to CloudWatch Agent:
|
The following buckets currently have the platform-hca-dev
platform-hca-prod
platform-anvil-dev
platform-anvil-prod
|
@hannes-ucsc: "@dsotirho-ucsc comments above list the retention for the various logs in the system. Any necessary changes to the retention are tracked in dedicated tickets. These tickets are linked from the comments. @nolunwa-ucsc to review and decide on next steps." |
with NIST SP 800 53 Rev 5, retain audit records for a time period in compliance with M-21-31 12 month active storage and 18 month cold data storage: AWS Cloudtrail Log• Amazon Cloudwatch Logs • AWS Config • Amazon S3 Access Logs • Amazon VPC Flow Logs • AWS WAF Logs • AWS Shield • AWS Guardduty • AWS Security Hub |
Executive orders apply to agencies in the federal government. Why would this be relevant for us? |
FedRAMP SSP rev 5 Template for Moderate system says
|
Assignee to come up with design for increasing retention in compliance with that executive order. |
Implementation of that executive order is tracked in #6070. |
What is the Retention Period for the following Audit Capabilities that is enabled:
The text was updated successfully, but these errors were encountered: