๐ก๏ธ AWS RDS Cluster required log exports to CloudWatch Logs are not enabled๐ข
- Contextual name: ๐ก๏ธ Cluster required log exports to CloudWatch Logs are not enabled๐ข
- ID:
/ce/ca/aws/rds/cluster-cloudwatch-logs-export - Tags:
- ๐ข Policy with categories
- ๐ข Policy with type
- ๐ข Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
RELIABILITY
Logicโ
- ๐ง prod.logic.yaml๐ข
- ๐ AWS RDS Cluster
- ๐ AWS RDS Cluster - object.extracts.yaml
- ๐งช test-data.json
Similar Policiesโ
- AWS Security Hub: [RDS.34] Aurora MySQL DB clusters should publish audit logs to CloudWatch Logs
- AWS Security Hub: [RDS.45] Aurora MySQL DB clusters should have audit logging enabled
- AWS Security Hub: [RDS.37] Aurora PostgreSQL DB clusters should publish logs to CloudWatch Logs
- AWS Security Hub: [DocumentDB.4] Amazon DocumentDB clusters should publish audit logs to CloudWatch Logs
- AWS Security Hub: [Neptune.2] Neptune DB clusters should publish audit logs to CloudWatch Logs
Descriptionโ
Descriptionโ
This policy identifies supported AWS RDS clusters that are not configured to export the required engine-specific database logs to Amazon CloudWatch Logs. It applies to Aurora MySQL, Aurora PostgreSQL, Amazon DocumentDB, and Amazon Neptune clusters.
The required log export depends on the database engine:
- Aurora MySQL:
audit- Aurora PostgreSQL:
postgresql- Amazon DocumentDB:
audit- Amazon Neptune:
auditRationaleโ
Exporting database logs to Amazon CloudWatch Logs is critical for maintaining operational visibility and meeting security and compliance requirements. Logs stored locally on an RDS cluster are transient and may be lost during maintenance operations, cluster restarts, or unexpected failures. By contrast, CloudWatch Logs provides durable, centralized storage that preserves historical log data for auditing and forensic analysis.
Once logs are available in CloudWatch Logs, organizations can create metric filters and alarms to detect significant events, such as repeated connection failures, unauthorized access attempts, or performance issues including slow-running queries. CloudWatch Logs Insights further enhances visibility by enabling efficient querying and analysis of log data across multiple RDS clusters, improving troubleshooting and incident response capabilities.
... see more
Remediationโ
Remediationโ
Enable Required CloudWatch Log Exportsโ
To ensure database logs are retained and available for centralized monitoring, troubleshooting, and auditing, configure supported AWS RDS clusters to export the required database log types to Amazon CloudWatch Logs.
CloudWatch log exports are enabled at the cluster level by updating the DB cluster configuration with the
--cloudwatch-logs-export-configurationparameter. The required log type depends on the database engine and engine version.From Command Lineโ
Aurora MySQLโ
Enable export of audit logs:
aws rds modify-db-cluster \
--db-cluster-identifier {{db-cluster-identifier}} \
--cloudwatch-logs-export-configuration '{"EnableLogTypes":["audit"]}'Aurora PostgreSQLโ
Enable export of PostgreSQL logs:
aws rds modify-db-cluster \
--db-cluster-identifier {{db-cluster-identifier}} \
--cloudwatch-logs-export-configuration '{"EnableLogTypes":["postgresql"]}'Amazon DocumentDBโ
Enable export of audit logs:
aws docdb modify-db-cluster \
... [see more](remediation.md)