Check provider logo

Network Firewall has logging enabled

networkfirewall_logging_enabled

Severityhigh
by Prowler

AWS Network Firewall has stateful engine logging configured with at least one log type (FLOW, ALERT, or TLS) and an active log destination

Risk

Absent Network Firewall logs reduce visibility and forensics. Malicious flows, C2 traffic, and data exfiltration can go undetected, impacting:

  • Confidentiality (leakage)
  • Integrity (unauthorized traffic allowed)
  • Availability (DDoS patterns unnoticed)
Run this check with Prowler CLI

prowler aws --checks networkfirewall_logging_enabled

Recommendation

Enable comprehensive firewall logging and send FLOW, ALERT, and when applicable TLS events to a centralized, tamper-resistant destination. Apply least privilege to writers/readers, enforce encryption and retention, and integrate alerts with monitoring for defense in depth.

Remediation

CLI

aws network-firewall update-logging-configuration --firewall-arn <FIREWALL_ARN> --logging-configuration 'LogDestinationConfigs=[{LogType=FLOW,LogDestinationType=CLOUDWATCH_LOGS,LogDestination={LogGroup=<LOG_GROUP_NAME>}}]'

Native IaC
Terraform
Other
  1. Open the AWS console and go to VPC > Network Firewall > Firewalls
  2. Select your firewall and open the Firewall details tab
  3. In the Logging section, click Edit
  4. Enable at least one Log type (e.g., Flow)
  5. Choose Destination type: CloudWatch Logs and select an existing log group
  6. Click Save

Source Code

Resource Type

AwsNetworkFirewallFirewall

References