Ensure at least one enabled trail is present in a region for system and information integrity.
Rule | At least one enabled trail should be present in a region |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Low |
Rule Description:
This rule requires that at least one enabled trail is present in a region for compliance with NIST 800-53 Revision 5. The rule aims to ensure that logging and monitoring capabilities are established to track and investigate security-related events within an organization's infrastructure.
Rule Troubleshooting:
If there are no enabled trails in a region, it indicates that the logging and monitoring configuration is not in compliance with NIST 800-53 Revision 5. Here are the troubleshooting steps to address this issue:
Verify AWS CloudTrail service configuration:
Check trail status:
Validate logging settings:
Review permissions and IAM roles:
Remediation:
Follow these step-by-step instructions to remediate the issue and ensure compliance with the rule:
AWS CLI Commands:
If you prefer using the AWS Command Line Interface (CLI) for remediation, here are the corresponding commands:
aws cloudtrail create-trail --name <trail-name> --s3-bucket-name <bucket-name> --region <region> --is-multi-region-trail --include-global-service-events --enable-log-file-validation --enable-cloudwatch-logs-exports ReadOnly,WriteOnly,DataEvents
aws cloudtrail update-trail --name <trail-name> --region <region> --is-multi-region-trail --include-global-service-events --enable-log-file-validation --enable-cloudwatch-logs-exports ReadOnly,WriteOnly,DataEvents
Ensure to replace
<trail-name>
, <bucket-name>
, and <region>
with the specific details for your environment.Note: Make sure you have the necessary permissions to execute these commands.
By following the above troubleshooting steps and using the provided AWS CLI commands, you can ensure compliance with the requirement of having at least one enabled trail in a region for NIST 800-53 Revision 5.