π‘οΈ AWS MQ ActiveMQ Broker Audit Logging is not enabledπ’
- Contextual name: π‘οΈ ActiveMQ Broker Audit Logging is not enabledπ’
- ID:
/ce/ca/aws/mq/broker-logging - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
- π AWS MQ Broker
- π AWS MQ Broker - object.extracts.yaml
- π§ͺ test-data.json
Similar Policiesβ
- AWS Security Hub: [MQ.2] ActiveMQ brokers should stream audit logs to CloudWatch
Descriptionβ
Descriptionβ
This policy identifies AWS MQ for ActiveMQ Brokers that do not have audit logging enabled.
Rationaleβ
Audit logging provides visibility into administrative actions performed on the broker, including changes made through the Amazon MQ console, AWS CLI, or Amazon MQ API. Enabling audit logs is a security best practice that helps detect unauthorized or unexpected configuration changes and supports compliance and governance requirements by maintaining a detailed audit trail of management activity.
Auditβ
This policy flags an AWS MQ Broker running ActiveMQ as
INCOMPLIANTwhen the Logs: Audit field is set to Disabled.AWS MQ Brokers running RabbitMQ are marked as
INAPPLICABLE.
Remediationβ
Remediationβ
Enable Audit Logging for the Brokerβ
Enable audit logging on the Amazon MQ for ActiveMQ broker to ensure that all administrative actions are captured and delivered to Amazon CloudWatch Logs.
From the Command Lineβ
Step 1: Enable Audit Logs on the Brokerβ
Run the following command to update the broker configuration and enable audit logging:
aws mq update-broker \
--broker-id {{broker-id}} \
--logs 'Audit=true'Ensure Required CloudWatch Logs Permissionsβ
Audit logs are delivered to Amazon CloudWatch Logs. To successfully publish logs, the required IAM permissions and resource-based policies must be in place.
Grant
logs:CreateLogGroupPermissionβEnsure that the IAM principal used to create or manage the broker has permission to create CloudWatch log groups.
Example IAM policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "logs:CreateLogGroup",
"Resource": "arn:aws:logs:*:*:log-group:/aws/amazonmq/*"
}
]
}Important: If this permission is not granted before the broker is created or rebooted, Amazon MQ will not create the required log group.
... see more