This rule requires at least one multi-region AWS CloudTrail to be present in an account for enhanced security and monitoring.
Rule | At least one multi-region AWS CloudTrail should be present in an account |
Framework | SOC 2 |
Severity | ✔ Medium |
Rule Description:
According to the SOC 2 compliance requirements, it is mandatory to have at least one multi-region AWS CloudTrail within an AWS account. CloudTrail provides a detailed history of AWS API calls made in your account, including the source IP address, accessed resources, and related information. Having a multi-region CloudTrail helps ensure better visibility and monitoring of account activities while minimizing the risk of data loss or compromise.
Remediation Steps:
To comply with the SOC 2 requirement, follow the steps below to set up a multi-region AWS CloudTrail:
1. Log in to the AWS Management Console:
2. Open the CloudTrail service:
3. Create a new CloudTrail trail:
4. Trail settings:
5. Data events and management events:
6. Storage location and encryption:
7. Enable advanced settings (optional):
8. Review and create the trail:
Troubleshooting Steps:
If you encounter any issues during the setup process, consider the following troubleshooting steps:
IAM Permissions: Ensure that the IAM user or role you are using to create the trail has the necessary permissions, such as
cloudtrail:CreateTrail
and permission to access the chosen S3 bucket.S3 Bucket Permissions: Check if the IAM user/role has appropriate permissions for accessing and writing data to the S3 bucket where the logs will be stored.
S3 Bucket Availability: Ensure that the selected S3 bucket is in the same region as the CloudTrail trail to enable multi-region logging.
Bucket Name Availability: Verify that the chosen S3 bucket name is unique and not already used by another account in the same AWS region.
CloudTrail Service Limit: If you are unable to create a trail, check if you have reached the maximum limit of CloudTrail trails allowed for your AWS account.
CloudTrail Log Delivery: Verify if the CloudTrail logs are being delivered to the specified S3 bucket by checking the S3 bucket and the CloudTrail trail status.
Additional Notes: