π‘οΈ AWS Account Multi-Region CloudTrail is not enabledπ’
- Contextual name: π‘οΈ Multi-Region CloudTrail is not enabledπ’
- ID:
/ce/ca/aws/account/multi-region-cloudtrail - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY,RELIABILITY
Logicβ
- π§ prod.logic.yamlπ’
- π AWS Account
- π AWS CloudTrail Trail - object.extracts.yaml
- π§ͺ test-data.json
Similar Policiesβ
- Cloud Conformity: CloudTrail Enabled
- Internal:
dec-z-3ba226c7
Similar Internal Rulesβ
| Rule | Policies | Flags |
|---|---|---|
| βοΈ dec-z-3ba226c7 | 1 |
Descriptionβ
Descriptionβ
AWS CloudTrail is a web service that records AWS API calls for your account and delivers log files to you. The recorded information includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by the AWS service. CloudTrail provides a history of AWS API calls for an account, including API calls made via the Management Console, SDKs, command line tools, and higher-level AWS services (such as CloudFormation).
Rationaleβ
The AWS API call history produced by CloudTrail enables security analysis, resource change tracking, and compliance auditing. Additionally,
- Ensuring that a multi-regions trail exists will ensure that unexpected activity occurring in otherwise unused regions is detected.
- Ensuring that a multi-regions trail exists will ensure that
Global Service Loggingis enabled for a trail by default to capture recording of events generated on AWS global services.- For a multi-regions trail, ensuring that management events configured for all type of Read/Writes ensures recording of management operations that are performed on all resources in an AWS account.
... see more
Remediationβ
Remediationβ
Perform the following to enable global (Multi-region) CloudTrail logging:
From Consoleβ
Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/cloudtrail.
Click on
Trailson the left navigation pane.Click
Get Started Now, if presented.
Click
Add new trail.Enter a trail name in the
Trail namebox.A trail created in the console is a multi-region trail by default.
Specify an S3 bucket name in the
S3 bucketbox.Specify the AWS KMS alias under the
Log file SSE-KMS encryptionsection or create a new key.Click
Next.
- Ensure
Management eventscheck box is selected.- Ensure both
ReadandWriteare check under API activity.- Click
Next.- Review your trail settings and click
Create trail.From Command Lineβ
Create a multi-region trail:
aws cloudtrail create-trail --name <trail_name> --bucket-name <s3_bucket_for_cloudtrail> --is-multi-region-trail aws cloudtrail update-trail --name <trail_name> --is-multi-region-trail
... [see more](remediation.md)