Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: AWS CloudTrail Multi-Region Setting

Ensure presence of at least one multi-region AWS CloudTrail in the account.

RuleAt least one multi-region AWS CloudTrail should be present in an account
FrameworkHIPAA
Severity
Medium

Rule Description

This rule ensures that at least one multi-region AWS CloudTrail is present in an account to meet the compliance requirements of the Health Insurance Portability and Accountability Act (HIPAA). HIPAA is a regulatory framework that governs the use and security of sensitive healthcare information.

CloudTrail is a service provided by AWS that enables auditing and monitoring of events within an AWS account. It records API calls and other account activities, providing essential visibility into the actions performed on AWS resources.

Having a multi-region CloudTrail setup helps ensure high availability and durability of the audit logs by replicating them to multiple AWS regions. In case of a regional failure, the logs remain accessible and intact, allowing for continued compliance and investigation.

Troubleshooting Steps

If there is no multi-region AWS CloudTrail present in the account, the following steps can be taken to troubleshoot and implement the necessary changes:

  1. 1.

    Check for existing CloudTrail trails: Use the AWS Management Console, AWS CLI, or SDKs/APIs to view the existing CloudTrail trails in the account.

  2. 2.

    Identify a multi-region trail: Ensure that there is a CloudTrail trail configured to log events in multiple AWS regions. If no multi-region trail is found, proceed to the next step.

  3. 3.

    Create a multi-region trail: Create a new CloudTrail trail with the required multi-region configuration. You can follow the steps below:

    • AWS Management Console: Go to the CloudTrail service in the AWS Management Console and click on "Trails." Click on "Create trail" and provide the necessary details such as trail name, storage settings, and management events. Enable the option to log events in all regions or select specific regions as per your requirements. Follow the prompts to complete the trail creation.

    • AWS CLI: Use the

      create-trail
      command to create a multi-region trail. Provide the required parameters such as trail name, S3 bucket name for log storage, and a JSON configuration file specifying the regions to include. Execute the command to create the trail.

      aws cloudtrail create-trail --name <trail-name> --s3-bucket-name <bucket-name> --is-multi-region --regions <region-list>
      
  4. 4.

    Enable the multi-region trail: Once the trail is created, remember to enable it so that it starts logging events. You can do this using the AWS Management Console, AWS CLI, or SDKs/APIs.

    • AWS Management Console: Select the trail, click on "Actions," and choose "Edit trail." Enable the trail by toggling the "Logging" status to "On" and save the changes.

    • AWS CLI: Use the

      update-trail
      command to update the trail and enable logging.

      aws cloudtrail update-trail --name <trail-name> --is-log-file-validation-enabled
      
  5. 5.

    Validate multi-region logging: After enabling the multi-region trail, verify that events from different regions are being logged successfully. You can review the CloudTrail logs stored in the specified S3 bucket or use the AWS CloudTrail console to search for specific events.

Additional Notes

  • It is essential to regularly review and monitor the CloudTrail logs to detect any unauthorized or suspicious activities within the AWS account.
  • Ensure that appropriate permissions are granted to the CloudTrail service for reading and writing logs to the S3 bucket and accessing other required AWS resources.
  • Consider enabling CloudTrail log file validation to ensure the integrity of the log files.
  • Implement a process for securely managing and retaining CloudTrail logs in compliance with HIPAA requirements and any other applicable regulations.

Implementing a multi-region AWS CloudTrail in an account helps maintain a reliable and compliant audit trail, ensuring the security and privacy of sensitive healthcare information.

Is your System Free of Underlying Vulnerabilities?
Find Out Now