This rule ensures the presence of at least one multi-region AWS CloudTrail in an account.
Rule | At least one multi-region AWS CloudTrail should be present in an account |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ Medium |
Rule Description:
This rule ensures compliance with the NIST 800-171 Revision 2 security requirement that at least one multi-region AWS CloudTrail should be present in an account. CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. By configuring a multi-region CloudTrail, you can capture AWS API activity across different regions, providing a comprehensive view of actions taken within your account.
Troubleshooting Steps:
Verify CloudTrail is enabled: Check if the CloudTrail service is already enabled in your AWS account. To do this, follow these steps:
Check if CloudTrail is configured for multi-region: Ensure that CloudTrail is configured to capture activity across multiple regions. To verify and configure multi-region logging, follow these steps:
Review CloudTrail trails: Check if there are any existing CloudTrail trails that are not configured for multi-region logging:
Verify IAM permissions: Ensure that the IAM (Identity and Access Management) user or role associated with your AWS account has the necessary permissions to configure and manage CloudTrail. To verify the IAM permissions, follow these steps:
Code:
There isn't any specific code required for this rule. The configuration and management of CloudTrail can be done through the AWS Management Console or via AWS CLI commands.
Remediation:
To remediate this rule, follow the step-by-step guide below:
By following these steps, you will ensure compliance with the NIST 800-171 Revision 2 requirement of having at least one multi-region AWS CloudTrail present in your account.