💼 10.5.2 Protect audit trail files from unauthorized modifications.
- ID:
/frameworks/pci-dss-v3.2.1/10/05/02
Description
Empty...
Similar
- Sections
/frameworks/pci-dss-v4.0/10/03/02/frameworks/aws-fsbp-v1.0.0/cloudtrail/02/frameworks/aws-fsbp-v1.0.0/cloudtrail/04/frameworks/aws-fsbp-v1.0.0/config/01
- Internal
- ID:
dec-c-e31ad590
- ID:
Similar Sections (Take Policies From)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [CloudTrail.2] CloudTrail should have encryption at-rest enabled | 1 | no data | |||
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [CloudTrail.4] CloudTrail log file validation should be enabled | 1 | 1 | no data | ||
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [Config.1] AWS Config should be enabled and use the service-linked role for resource recording | 1 | no data | |||
| 💼 PCI DSS v4.0 → 💼 10.3.2 Audit log files are protected to prevent modifications by individuals. | 2 | 4 | no data |
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 PCI DSS v4.0 → 💼 10.3.2 Audit log files are protected to prevent modifications by individuals. | 2 | 4 | no data |
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|
Policies (4)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ AWS Account Config is not enabled in all regions🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS Account IAM Access Analyzer is not enabled for all regions🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudTrail is not encrypted with KMS CMK🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudTrail Log File Validation is not enabled🟢 | 1 | 🟢 x6 | no data |
Internal Rules
| Rule | Policies | Flags |
|---|---|---|
| ✉️ dec-x-b1e1a494 | 1 |