This rule states that at least one enabled trail should be present in a particular region.
Rule | At least one enabled trail should be present in a region |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Low |
Rule Description
At least one enabled trail should be present in a region for NIST 800-53 Revision 5. This rule ensures that there is an operational CloudTrail service in each region to monitor and record API activity and account changes made within the AWS environment. The CloudTrail service provides essential information for security analysis, auditing, and troubleshooting.
Troubleshooting Steps
If there is no enabled trail in a region, follow these steps to troubleshoot the issue:
Code Samples
AWS CLI Command
To list all CloudTrail trails in a specific region, you can use the following AWS CLI command:
aws cloudtrail describe-trails --region <region-name>
AWS CloudFormation Template
To create a new CloudTrail trail in a specific region using AWS CloudFormation, you can use the following sample template:
Resources:
MyCloudTrail:
Type: "AWS::CloudTrail::Trail"
Properties:
TrailName: "MyTrail"
S3BucketName: "my-bucket-name"
IsMultiRegionTrail: true
EnableLogFileValidation: true
IncludeGlobalServiceEvents: true
Make sure to replace "MyTrail" with your desired trail name and "my-bucket-name" with the name of the S3 bucket where you want to store the logs.
Remediation Steps
To ensure compliance with the rule and remediate any violations, follow these steps:
By adhering to these steps, you will ensure that at least one enabled CloudTrail trail is present in each region, meeting the requirements of NIST 800-53 Revision 5.