This rule ensures the presence of at least one enabled trail in a region for compliance.
Rule | At least one enabled trail should be present in a region |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Low |
Rule Description
The rule states that at least one enabled trail should be present in a specific region for NIST Cybersecurity Framework (CSF) v1. This rule ensures that proper logging and monitoring mechanisms are in place to meet the requirements set by the NIST CSF v1.
Troubleshooting Steps
If you encounter issues with this rule, follow these troubleshooting steps:
Necessary Codes
There are no specific codes provided for this rule. However, you can use the following code samples for creating and enabling a trail in AWS CloudTrail:
AWS CLI Command
To create a trail:
aws cloudtrail create-trail --name MyTrail --s3-bucket-name my-bucket \ --is-multi-region-trail --include-global-service-events
To enable a trail:
aws cloudtrail update-trail --name MyTrail --is-multi-region-trail
AWS CloudFormation Template
To create a trail using CloudFormation, you can use the following template snippet:
Resources:
MyTrail:
Type: AWS::CloudTrail::Trail
Properties:
IsMultiRegionTrail: true
IncludeGlobalServiceEvents: true
S3BucketName: my-bucket
Note: Replace
my-bucket
with your desired S3 bucket name.Step-by-Step Guide for Remediation
Follow these steps to ensure compliance with the rule:
By following these steps, you can ensure compliance with the rule and meet the logging and monitoring requirements specified by the NIST CSF v1.