This rule ensures that access logging is enabled for the CloudTrail S3 bucket, enhancing security.
Rule | Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket |
Framework | cis_v150 |
Severity | ✔ Low |
Rule Description:
This rule ensures that access logging is enabled on the CloudTrail S3 bucket for cis_v150. Enabling S3 bucket access logging provides detailed information about all requests made to the bucket and helps with security, compliance, and auditing purposes.
Troubleshooting Steps:
If access logging is not enabled on the CloudTrail S3 bucket, follow these troubleshooting steps:
Remediation Steps:
Follow the steps below to enable access logging on the CloudTrail S3 bucket:
AWS CLI Commands:
Alternatively, you can use the AWS Command Line Interface (CLI) to enable access logging on the CloudTrail S3 bucket. Use the following commands:
aws s3api put-bucket-logging --bucket <bucket-name> --logging-configuration '{"DestinationBucketName":"<logging-bucket>","LogFilePrefix":"<log-prefix>"}'
Replace
<bucket-name>
with the name of the CloudTrail S3 bucket, <logging-bucket>
with the name of the bucket where access logs will be stored, and <log-prefix>
with a unique prefix for the access log objects.Conclusion:
Enabling access logging on the CloudTrail S3 bucket provides valuable information for auditing and monitoring purposes. By following the remediation steps mentioned above, you can ensure that S3 bucket access logging is enabled on the CloudTrail S3 bucket for cis_v150.