Remediation
Perform the following to configure CloudTrail to use SSE-KMS:
From Consoleβ
-
Sign in to the AWS Management Console and open the CloudTrail console at https://console.aws.amazon.com/cloudtrail.
-
In the left navigation pane, choose
Trails. -
Click on a Trail.
-
Under the
S3section click on the edit button (pencil icon). -
Click
Advanced. -
Select an existing CMK from the
KMS key Iddrop-down menu.- Note: Ensure the CMK is located in the same region as the S3 bucket.
- Note: You will need to apply a KMS Key policy on the selected CMK in order for CloudTrail as a service to encrypt and decrypt log files using the CMK provided. Steps are provided here for editing the selected CMK Key policy.
-
Click
Save. -
You will see a notification message stating that you need to have decrypt permissions on the specified KMS key to decrypt log files.
-
Click
Yes.
From Command Lineβ
Run the following command to specify a KMS key ID to use with a trail:
aws cloudtrail update-trail --name {{trail-name}} --kms-id {{cloudtrail-kmskey}}
Run the following command to attach a key policy to a specified KMS key:
aws kms put-key-policy --key-id {{cloudtrail-kms-key}} --policy {{cloudtrailkms-key-policy}}