This rule ensures that CloudTrail trails are integrated with CloudWatch logs for heightened security and monitoring.
Rule | CloudTrail trails should be integrated with CloudWatch logs |
Framework | NIST 800-53 Revision 4 |
Severity | ✔ Critical |
Rule Description:
CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. Integrating CloudTrail with CloudWatch Logs provides a centralized location for collecting, analyzing, and storing logs generated by CloudTrail. NIST 800-53 Revision 4 is a standard published by the National Institute of Standards and Technology, outlining security and privacy controls for federal information systems. This rule requires the integration of CloudTrail trails with CloudWatch Logs to align with the security guidelines provided in NIST 800-53 Revision 4.
Troubleshooting Steps:
If you encounter any issues while integrating CloudTrail trails with CloudWatch Logs, follow these troubleshooting steps:
Verify IAM Permissions:
logs:CreateLogGroup
and logs:CreateLogStream
permissions.Verify CloudTrail Configuration:
Verify CloudWatch Logs Configuration:
Verify CloudTrail IAM Role:
logs:PutLogEvents
and logs:DescribeLogStreams
permissions.Check CloudTrail and CloudWatch Logs Integration Status:
Monitor CloudWatch Logs for Errors:
Necessary Codes:
No specific codes are required for this integration. However, IAM policies need to be modified to grant necessary permissions for CloudTrail to write logs to CloudWatch Logs.
Remediation Steps:
Follow the step-by-step guide below to integrate CloudTrail trails with CloudWatch Logs:
By following the above steps, you will successfully integrate CloudTrail trails with CloudWatch Logs to comply with the NIST 800-53 Revision 4 standard.