This rule ensures CloudTrail trails are integrated with CloudWatch logs.
Rule | CloudTrail trails should be integrated with CloudWatch logs |
Framework | SOC 2 |
Severity | ✔ Critical |
Rule Description:
This rule ensures that CloudTrail trails are integrated with CloudWatch logs for SOC 2 compliance. CloudTrail is a service that records AWS API calls and provides valuable insights into who made the request, when it was made, and what actions were performed. CloudWatch logs, on the other hand, is a scalable and highly available log management service provided by AWS. Integrating CloudTrail with CloudWatch logs allows for better visibility, monitoring, and analysis of CloudTrail logs, which is crucial for meeting SOC 2 compliance requirements.
Troubleshooting Steps:
If the integration between CloudTrail and CloudWatch logs is not working as expected, you can follow these troubleshooting steps:
Verify CloudWatch Log Group Subscription:
Check IAM Role Permissions:
logs:CreateLogStream
and logs:PutLogEvents
.Validate Trail Configuration:
Verify Trail Status:
Review CloudWatch Log Group Size:
Necessary Codes (If Applicable):
No specific codes are required for this rule. However, you may need to use the AWS Management Console or AWS CLI commands for troubleshooting and remediation steps mentioned above.
Remediation Steps:
To integrate CloudTrail trails with CloudWatch logs for SOC 2 compliance, follow these steps:
AWS Management Console:
AWS CLI Command:
Replaceaws cloudtrail update-trail --name <trail-name> --cloud-watch-logs-log-group-arn <log-group-arn>
<trail-name>
with the name of the CloudTrail trail and <log-group-arn>
with the ARN of the CloudWatch log group.Following these steps will successfully integrate the CloudTrail trails with CloudWatch logs for SOC 2 compliance requirements. Remember to regularly monitor and review the CloudWatch logs to ensure proper functioning and adherence to compliance standards.