π‘οΈ AWS Account Multi-Region CloudTrail is not enabledπ’
- Contextual name: π‘οΈ Multi-Region CloudTrail is not enabledπ’
- ID:
/ce/ca/aws/account/multi-region-cloudtrail - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY,RELIABILITY
Logicβ
- π§ prod.logic.yamlπ’
- π AWS Account
- π AWS CloudTrail Trail - object.extracts.yaml
- π§ͺ test-data.json
Similar Policiesβ
- AWS Security Hub: [CloudTrail.1] CloudTrail should be enabled and configured with at least one multi-Region trail that includes read and write management events
- Cloud Conformity: CloudTrail Enabled
- Internal:
dec-z-3ba226c7
Similar Internal Rulesβ
| Rule | Policies | Flags |
|---|---|---|
| βοΈ dec-z-3ba226c7 | 1 |
Descriptionβ
Descriptionβ
AWS CloudTrail is a web service that records AWS API calls for your account and delivers log files to you. The recorded information includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by the AWS service. CloudTrail provides a history of AWS API calls for an account, including API calls made via the Management Console, SDKs, command line tools, and higher-level AWS services (such as CloudFormation).
Rationaleβ
The AWS API call history produced by CloudTrail enables security analysis, resource change tracking, and compliance auditing. Additionally:
- Ensuring that a multi-region trail exists helps detect unexpected activity in otherwise unused regions.
- Ensuring that a multi-region trail exists ensures
Global Service Loggingis enabled by default to capture events generated by AWS global services.- For a multi-region trail, ensuring that management events are configured for both read and write operations ensures recording of management operations performed on all resources in an AWS account.
... see more
Remediationβ
Remediationβ
Perform the following to enable global (Multi-region) CloudTrail logging:
From Consoleβ
Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/cloudtrail.
Click on
Trailson the left navigation pane.Click
Get Started Now, if presented.
- Click
Add new trail.- Enter a trail name in the
Trail namebox.- A trail created in the console is a multi-region trail by default.
- Specify an S3 bucket name in the
S3 bucketbox.- Specify the AWS KMS alias under the
Log file SSE-KMS encryptionsection or create a new key.- Click
Next.Ensure
Management eventscheck box is selected.Ensure both
ReadandWriteare check under API activity.Click
Next.Review your trail settings and click
Create trail.From Command Lineβ
Create a multi-region trail:
aws cloudtrail create-trail \
--name {{trail-name}} \
--bucket-name {{s3-bucket-name}} \
--is-multi-region-trailEnable multi-region on an existing trail:
... see more