Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: At least one enabled trail should be present in a region

This rule ensures the presence of at least one enabled trail in a region to enhance monitoring and security measures.

RuleAt least one enabled trail should be present in a region
FrameworkSOC 2
Severity
Low

SOC 2 Rule Description: Enabled Trail Presence in a Region

This rule mandates that at least one enabled trail must be present in a specific region for SOC 2 compliance. Trails are used to capture, monitor, and retain AWS API activity, allowing for enhanced security control and regulatory compliance. Ensuring the presence of enabled trails in the required regions helps maintain an audit trail of activity and adherence to SOC 2 standards.

Possible Issues and Troubleshooting

Issue 1: No enabled trail found in the specified region.

  • Troubleshooting Steps:
    1. 1.
      Check if any trails exist in the specified region.
    2. 2.
      Verify if these trails are enabled.
    3. 3.
      If no enabled trails are present, proceed to create and enable a new trail.

Remediation Steps

To address the SOC 2 compliance requirement of having at least one enabled trail in a specific region, follow the steps outlined below:

  1. 1.

    Identify the Region: Determine the specific region where the enabled trail needs to be created.

  2. 2.

    Create a Trail:

    • Use the AWS Command Line Interface (CLI) and execute the following command:
      aws cloudtrail create-trail --name <trail-name> --s3-bucket-name <bucket-name> --is-multi-region-trail --enable-log-file-validation --include-global-service-events
      
      Replace
      <trail-name>
      with a unique name for the trail, and
      <bucket-name>
      with the name of the S3 bucket that will store the trail logs. Ensure the bucket is located in the specified region.
  3. 3.

    Enable the Trail:

    • Execute the following command to enable the created trail:
      aws cloudtrail update-trail --name <trail-name> --is-multi-region-trail
      
      Replace
      <trail-name>
      with the name of the trail created in the previous step.
  4. 4.

    Verify the Enabled Trail:

    • Execute the below command to ensure the trail is enabled:
      aws cloudtrail describe-trails --trail-name-list <trail-name>
      
      Replace
      <trail-name>
      with the name of the trail created earlier.
  5. 5.

    Repeat the process if necessary:

    • If no enabled trails are found in the specified region, repeat steps 2-4 for additional regions.

Conclusion

Adhering to SOC 2 requirements by having at least one enabled trail in a specific region ensures comprehensive tracking and logging of API activity. By following the provided remediation steps, organizations can maintain SOC 2 compliance and enhance their security posture.

Is your System Free of Underlying Vulnerabilities?
Find Out Now