Description
AWS CloudTrail is a web service that records AWS API calls for your account and delivers log files to you. The recorded information includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by the AWS service. CloudTrail provides a history of AWS API calls for an account, including API calls made via the Management Console, SDKs, command line tools, and higher-level AWS services (such as CloudFormation).
Rationaleβ
The AWS API call history produced by CloudTrail enables security analysis, resource change tracking, and compliance auditing. Additionally:
- Ensuring that a multi-region trail exists helps detect unexpected activity in otherwise unused regions.
- Ensuring that a multi-region trail exists ensures
Global Service Loggingis enabled by default to capture events generated by AWS global services. - For a multi-region trail, ensuring that management events are configured for both read and write operations ensures recording of management operations performed on all resources in an AWS account.
Impactβ
S3 lifecycle features can be used to manage the accumulation and management of logs over time. See the following AWS resource for more information on these features:
Auditβ
Perform the following to determine if CloudTrail is enabled for all regions:
From Consoleβ
-
Sign in to the AWS Management Console and open the CloudTrail console at https://console.aws.amazon.com/cloudtrail.
-
Click on
Trailson the left navigation pane.- You will be presented with a list of trails across all regions.
-
Ensure at least one Trail has
Yesspecified in theMulti-region trailcolumn. -
Click on a trail via the link in the Name column.
-
Ensure
Loggingis set toON. -
Ensure
Multi-region trailis set toYes. -
In section
Management EventsensureAPI activityset toALL.
From Command Lineβ
-
List all trails:
aws cloudtrail describe-trails -
Ensure
IsMultiRegionTrailis set totrue:aws cloudtrail get-trail-status --name {{trail-name}} -
Ensure
IsLoggingis set totrue:aws cloudtrail get-event-selectors --trail-name {{trail-name}} -
Ensure there is at least one
fieldSelectorfor a Trail that equalsManagement:- This should NOT output any results for
"Field": "readOnly"if eithertrueorfalseis returned one of the checkboxes is not selected forreadorwrite.
Example of correct output:
"TrailARN": "<your_trail_ARN>",
"AdvancedEventSelectors": [
{
"Name": "Management events selector",
"FieldSelectors": [
{
"Field": "eventCategory",
"Equals": [
"Management"
]
}
]
}
] - This should NOT output any results for
Default Valueβ
Not Enabled.
Referencesβ
- CCE-78913-1
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-concepts.html#cloudtrail-concepts-management-events
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-and-data-events-with-cloudtrail.html?icmpid=docs_cloudtrail_console#logging-management-events
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-supported-services.html#cloud-trail-supported-services-data-events