Checks if the Application Load Balancer and the Classic Load Balancer have logging enabled. The rule is NON_COMPLIANT if the access_logs.s3.enabled
is false or access_logs.S3.bucket
is not equal to the s3BucketName that you provided.
The rule does not apply to Network Load Balancers or Gateway Load Balancers.
Identifier: ELB_LOGGING_ENABLED
Resource Types: AWS::ElasticLoadBalancing::LoadBalancer, AWS::ElasticLoadBalancingV2::LoadBalancer
Trigger type: Configuration changes
AWS Region: All supported AWS regions
Parameters:
Comma-separated list of Amazon S3 bucket names for Amazon ELB to deliver the log files.
To create AWS Config managed rules with AWS CloudFormation templates, see Creating AWS Config Managed Rules With AWS CloudFormation Templates.
elb-internal-scheme-check
elb-predefined-security-policy-ssl-check
Did this page help you? - Yes
Thanks for letting us know we're doing a good job!
If you've got a moment, please tell us what we did right so we can do more of it.
Did this page help you? - No
Thanks for letting us know this page needs work. We're sorry we let you down.
If you've got a moment, please tell us how we can make the documentation better.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4