๐ก๏ธ AWS RDS Cluster database logging is not enabled๐ข
- Contextual name: ๐ก๏ธ Cluster database logging is not enabled๐ข
- ID:
/ce/ca/aws/rds/cluster-cloudwatch-logs-export - Tags:
- ๐ข Policy with categories
- ๐ข Policy with type
- ๐ข Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
RELIABILITY
Logicโ
- ๐ง prod.logic.yaml๐ข
- ๐ AWS RDS Cluster
- ๐ AWS RDS Cluster - object.extracts.yaml
- ๐งช test-data.json
Similar Policiesโ
- AWS Security Hub: [RDS.34] Aurora MySQL DB clusters should publish audit logs to CloudWatch Logs
- AWS Security Hub: [RDS.37] Aurora PostgreSQL DB clusters should publish logs to CloudWatch Logs
- AWS Security Hub: [DocumentDB.4] Amazon DocumentDB clusters should publish audit logs to CloudWatch Logs
- AWS Security Hub: [Neptune.2] Neptune DB clusters should publish audit logs to CloudWatch Logs
Descriptionโ
Descriptionโ
This policy identifies AWS RDS Clusters that are not configured to export database logs to Amazon CloudWatch Logs. Enabling log exports ensures that database activity and operational events are captured and centrally stored for ongoing monitoring, analysis, and audit purposes.
Rationaleโ
Exporting database logs to Amazon CloudWatch Logs is critical for maintaining operational visibility and meeting security and compliance requirements. Logs stored locally on an RDS cluster are transient and may be lost during maintenance operations, cluster restarts, or unexpected failures. By contrast, CloudWatch Logs provides durable, centralized storage that preserves historical log data for auditing and forensic analysis.
Once logs are available in CloudWatch Logs, organizations can create metric filters and alarms to detect significant events, such as repeated connection failures, unauthorized access attempts, or performance issues including slow-running queries. CloudWatch Logs Insights further enhances visibility by enabling efficient querying and analysis of log data across multiple RDS clusters, improving troubleshooting and incident response capabilities.
... see more
Remediationโ
Remediationโ
Enable CloudWatch Log Exportsโ
To ensure database logs are retained and available for centralized monitoring, troubleshooting, and auditing, configure AWS RDS clusters to export supported database log types to Amazon CloudWatch Logs. Exported logs provide durable storage and enable security monitoring, operational analysis, and compliance reporting.
CloudWatch log exports are enabled at the cluster level by updating the DB cluster configuration with the
--cloudwatch-logs-export-configurationparameter. The specific log types that can be exported depend on the database engine and engine version.From Command Lineโ
Aurora MySQLโ
Enable export of error, general, slow query, audit, and instance logs:
aws rds modify-db-cluster \
--db-cluster-identifier mydbcluster \
--cloudwatch-logs-export-configuration '{"EnableLogTypes":["error","general","slowquery","audit","instance"]}'
Aurora PostgreSQLโ
Enable export of PostgreSQL engine and instance logs:
aws rds modify-db-cluster \
... [see more](remediation.md)