lacework-global-262
3.8 Ensure that VPC Flow Logs is Enabled for Every Subnet in a VPC Network (Automated)
Profile Applicability
• Level 1
Description
Flow Logs is a feature that enables users to capture information about the IP traffic going to and from network interfaces in the organization's VPC Subnets. Once a flow log is created, the user can view and retrieve its data in Stackdriver Logging. It is recommended that Flow Logs be enabled for every business-critical VPC subnet.
Rationale
VPC networks and subnetworks not reserved for internal HTTP(S) load balancing provide logically isolated and secure network partitions where GCP resources can be launched. When Flow Logs are enabled for a subnet, VMs within that subnet start reporting on all Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) flows. Each VM samples the TCP and UDP flows it sees, inbound and outbound, whether the flow is to or from another VM, a host in the on-premises datacenter, a Google service, or a host on the Internet. If two GCP VMs are communicating, and both are in subnets that have VPC Flow Logs enabled, both VMs report the flows.
Flow Logs supports the following use cases:
- Network monitoring
- Understanding network usage and optimizing network traffic expenses
- Network forensics
- Real-time security analysis
Flow Logs provide visibility into network traffic for each VM inside the subnet and can be used to detect anomalous traffic or provide insight during security workflows.
The Flow Logs must be configured such that all network traffic is logged, the interval of logging is granular to provide detailed information on the connections, no logs are filtered, and metadata to facilitate investigations are included.
Subnets reserved for use by internal HTTP(S) load balancers do not support VPC flow logs.
Impact
Standard pricing for Stackdriver Logging, BigQuery, or Cloud Pub/Sub applies. VPC Flow Logs generation will be charged starting in GA as described in reference: https://cloud.google.com/vpc/
Audit
From Console:
Go to the VPC network GCP Console visiting
https://console.cloud.google.com/networking/networks/listFrom the list of network subnets, make sure for each subnet:
Flow Logsis set toOnAggregation Intervalis set to5 secInclude metadatacheckbox is checkedSample rateis set to100%
It is not possible to determine if a Log filter has been defined from the console.
From Command Line:
gcloud compute networks subnets list --format json | \
jq -r '(["Subnet","Purpose","Flow_Logs","Aggregation_Interval","Flow_Sampling","Metadata","Logs_Filtered"] | (., map(length*"-"))),
(.[] |
[
.name,
.purpose,
(if has("enableFlowLogs") and .enableFlowLogs == true then "Enabled" else "Disabled" end),
(if has("logConfig") then .logConfig.aggregationInterval else "N/A" end),
(if has("logConfig") then .logConfig.flowSampling else "N/A" end),
(if has("logConfig") then .logConfig.metadata else "N/A" end),
(if has("logConfig") then (.logConfig | has("filterExpr")) else "N/A" end)
]
) |
@tsv' | \
column -t
The output of the above command will list:
- each subnet
- the subnet's purpose
- a
EnabledorDisabledvalue ifFlow Logsare enabled - the value for
Aggregation IntervalorN/Aif disabled, the value forFlow SamplingorN/Aif disabled - the value for
MetadataorN/Aif disabled - 'true' or 'false' if a Logging Filter is configured or 'N/A' if disabled.
If the subnet's purpose is PRIVATE then Flow Logs should be Enabled.
If Flow Logs is enabled then:
Aggregation_Intervalshould beINTERVAL_5_SECFlow_Samplingshould be 1Metadatashould beINCLUDE_ALL_METADATALogs_Filteredshould befalse.
Remediation
From Console:
Go to the VPC network GCP Console visiting
https://console.cloud.google.com/networking/networks/listClick the name of a subnet, The
Subnet detailspage displays.Click the
EDITbutton.Set
Flow LogstoOn.Expand the
Configure Logssection.Set
Aggregation Intervalto5 SEC.Check the box beside
Include metadata.Set
Sample rateto100.Click Save.
It is not possible to configure a Log filter from the console.
From Command Line:
To enable VPC Flow Logs for a network subnet, run the following command:
gcloud compute networks subnets update [SUBNET_NAME] --region [REGION] --enable-flow-logs --logging-aggregation-interval=interval-5-sec --logging-flow-sampling=1 --logging-metadata=include-all
References
https://cloud.google.com/vpc/docs/using-flow-logs#enabling_vpc_flow_logging
https://cloud.google.com/vpc/