Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • T ticket
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 1,809
    • Issues 1,809
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Packages & Registries
    • Packages & Registries
    • Package Registry
    • Infrastructure Registry
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value stream
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Administrator
  • ticket
  • Issues
  • #955

Closed
Open
Created Oct 19, 2022 by Administrator@rootMaintainer

AWS SOC 2 Report Rev2 : Ensure the S3 bucket has access logging enabled

Created by: armorcodegithubpreprod[bot]

##Compliance report

Report Type: AWS_SOC_Rev2

Report Time: 2022-07-18T14:52:42.780Z

Account: 747582675553

Resource: arn:aws:s3:::armorcode-lacework-export Reasons: [LoggingNotEnabled]

Resource: arn:aws:s3:::armorcode-mktplace-customers-072020 Reasons: [LoggingNotEnabled]

Resource: arn:aws:s3:::armorcode-mktplace-web2 Reasons: [LoggingNotEnabled]

Resource: arn:aws:s3:::mktplace-code-deploy Reasons: [LoggingNotEnabled]

Category: CC7.2: The entity monitors system components and the operation of those components for anomalies that are indicative of malicious acts, natural disasters, and errors affecting the entity's ability to meet its objectives; anomalies are analyzed to determine whether they represent security events.

ID: LW_S3_13

Recommendation: Ensure the S3 bucket has access logging enabled

Info link: https://api.lacework.net/ui/documents/Lacework_S3_Rec.pdf#page=13

Service: aws:s3

Status: NonCompliant

Severity: Info

Mitigation: Ensure the S3 bucket has access logging enabled

Finding Id : 7601371

Assignee
Assign to
Time tracking