Ensure that CloudTrail is integrated with CloudWatch
AWS CloudTrail is an AWS service that helps you enable governance, compliance, and operational and risk auditing of your AWS account. Actions taken by a user, role, or an AWS service are recorded as events in CloudTrail. Events include actions taken in the AWS Management Console, AWS Command Line Interface, and AWS SDKs and APIs. Sending CloudTrail logs to CloudWatch will provide real-time and historic activity logging based on user, API, resource, and IP address, and provides opportunity to establish alarms and notifications for any account activity.
Risk Level: Low
Cloud Entity: CloudTrail
CloudGuard Rule ID: D9.CFT.LOG.09
Covered by Spectral: Yes
Category: Management Tools
GSL LOGIC
AWS_CloudTrail_Trail should have CloudWatchLogsLogGroupArn
REMEDIATION
From CFT
Supply AWS::CloudTrail::Trail::CloudWatchLogsLogGroupArn with Loggroup ARN
See below example;
Resources:
CloudTrail:
Type: 'AWS::CloudTrail::Trail'
Properties:
...
CloudWatchLogsLogGroupArn: arn:aws:logs:us-east-2:123456789:log-group:cloudtrailtocloudwatch
...
References
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/send-cloudtrail-events-to-cloudwatch-logs.html#send-cloudtrail-events-to-cloudwatch-logs-console
- https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudtrail-trail.html#cfn-cloudtrail-trail-cloudwatchlogsloggrouparn
CloudTrail
AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. This event history simplifies security analysis, resource change tracking, and troubleshooting.
Compliance Frameworks
- AWS CloudFormation ruleset
Updated about 1 year ago