Description
AWS CloudTrail is a web service that records AWS API calls for an account and makes those logs available to users and resources in accordance with IAM policies. AWS Key Management Service (KMS) is a managed service that helps create and control the encryption keys used to encrypt account data, and uses Hardware Security Modules (HSMs) to protect the security of encryption keys. CloudTrail logs can be configured to leverage server side encryption (SSE) and KMS customer created master keys (CMK) to further protect CloudTrail logs. It is recommended that CloudTrail be configured to use SSE-KMS.
Rationaleβ
Configuring CloudTrail to use SSE-KMS provides additional confidentiality controls on log data as a given user must have S3 read permission on the corresponding log bucket and must be granted decrypt permission by the CMK policy.
Impactβ
Customer created keys incur an additional cost. See https://aws.amazon.com/kms/pricing/ for more information.
Auditβ
Perform the following to determine if CloudTrail is configured to use SSE-KMS:
From Consoleβ
- Sign in to the AWS Management Console and open the CloudTrail console at https://console.aws.amazon.com/cloudtrail.
- In the left navigation pane, choose
Trails
. - Select a Trail.
- In the
General details
section, selectEdit
to edit the trail configuration. - Ensure the box at
Log file SSE-KMS encryption
is checked and that a validAWS KMS alias
of a KMS key is entered in the respective text box.
From Command Lineβ
- Run the following command:
aws cloudtrail describe-trails
- For each trail listed, SSE-KMS is enabled if the trail has a
KmsKeyId
property defined.
Referencesβ
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/encryptingcloudtrail-log-files-with-aws-kms.html
- https://docs.aws.amazon.com/kms/latest/developerguide/create-keys.html
- CCE-78919-8
- https://awscli.amazonaws.com/v2/documentation/api/latest/reference/cloudtrail/update-trail.html
- https://awscli.amazonaws.com/v2/documentation/api/latest/reference/kms/putkey-policy.html
Additional Informationβ
Three statements that need to be added to the CMK policy:
- Enable Cloudtrail to describe CMK properties:
{
"Sid": "Allow CloudTrail access",
"Effect": "Allow",
"Principal": {
"Service": "cloudtrail.amazonaws.com"
},
"Action": "kms:DescribeKey",
"Resource": "*"
}
- Granting encrypt permissions:
{
"Sid": "Allow CloudTrail to encrypt logs",
"Effect": "Allow",
"Principal": {
"Service": "cloudtrail.amazonaws.com"
},
"Action": "kms:GenerateDataKey*",
"Resource": "*",
"Condition": {
"StringLike": {
"kms:EncryptionContext:aws:cloudtrail:arn": "arn:aws:cloudtrail:*:aws-account-id:trail/*"
}
}
}
- Granting decrypt permissions:
{
"Sid": "Enable CloudTrail log decrypt permissions",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::aws-account-id:user/username"
},
"Action": "kms:Decrypt",
"Resource": "*",
"Condition": {
"Null": {
"kms:EncryptionContext:aws:cloudtrail:arn": "false"
}
}
}