Ensure that your Amazon CloudTrail logs are encrypted at rest using Server-Side Encryption provided by Key Management Service (KMS) to enhance the security of your CloudTrail bucket and allow you to have better control over who can read the CloudTrail log files within your organization.
This rule can help you with the following compliance standards:
- CISAWSF
- PCI
- HIPAA
- GDPR
- APRA
- MAS
- NIST4
For further details on compliance standards supported by TrendAI Vision One™ Cloud Risk Management, see here.
This rule can help you work with the AWS Well-Architected Framework.
Enabling Amazon CloudTrail log file encryption using SSE-KMS will facilitate a strong security layer that is directly manageable by you using your own Customer Master Keys (CMKs) rather than allowing Amazon S3 to manage it by default using S3-Managed Encryption Keys (SSE-S3).
Audit
To determine if your Amazon CloudTrail trails are configured to encrypt log files using SSE-KMS, perform the following actions:
Remediation / Resolution
To enable SSE-KMS encryption for your existing Amazon CloudTrail trails, perform the following actions:
References
- AWS Documentation
- AWS CloudTrail FAQs
- CloudTrail Concepts
- Configure AWS KMS key policies for CloudTrail
- Updating a trail to use your KMS key
- Encrypting CloudTrail log files with AWS KMS keys (SSE-KMS)
- What Is AWS CloudTrail?
- Creating a trail for your AWS account
- Creating, updating, and managing trails with the AWS Command Line Interface
- AWS Command Line Interface (CLI) Documentation
- cloudtrail
- list-trails
- describe-trails
- update-trail
- kms
- create-key
- create-alias
- CloudFormation Documentation
- AWS CloudTrail resource type reference
- Terraform Documentation
- AWS Provider