This rule ensures the presence of a multi-region AWS CloudTrail in the account.
Rule | At least one multi-region AWS CloudTrail should be present in an account |
Framework | CISA-cyber-essentials |
Severity | ✔ Medium |
Rule Description
This rule ensures that there is at least one multi-region AWS CloudTrail present in an account, as a requirement for CISA Cyber Essentials compliance. AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. By having a multi-region CloudTrail, you ensure that your account's API activity is logged across different AWS regions, providing better visibility and accountability.
Troubleshooting Steps
If there is no multi-region CloudTrail present in the account, you can follow the troubleshooting steps below to address the issue:
Necessary Code
To create a multi-region CloudTrail, you can use the AWS Command Line Interface (CLI) or the AWS Management Console. Below is an example of the necessary CLI commands:
aws s3api create-bucket --bucket your-unique-bucket-name --region your-preferred-region
Replace "your-unique-bucket-name" with a unique name for your bucket, and "your-preferred-region" with the region where you want to create the bucket.
aws cloudtrail create-trail --name your-trail-name --s3-bucket-name your-unique-bucket-name --is-multi-region
Replace "your-trail-name" with a descriptive name for your CloudTrail.
Remediation Steps
Follow the step-by-step guide below to remediate the issue by creating a multi-region CloudTrail:
Create an S3 bucket: Using the AWS Management Console or the provided CLI command, create an S3 bucket to store the CloudTrail logs. Ensure that the bucket name is unique and choose the desired region for the bucket.
Create the multi-region CloudTrail: Using the AWS Management Console or the provided CLI command, create a new CloudTrail. Specify a descriptive name for the trail and select the S3 bucket you created in the previous step. Enable the option for multi-region logging to ensure API activity is recorded across all regions.
Configure CloudTrail settings: In the CloudTrail configuration, you can customize settings such as log file encryption, log retention, and CloudWatch Logs integration if desired. Adjust these settings based on your specific requirements.
Enable the CloudTrail: Once the CloudTrail is created and configured, enable it to start recording API activity in your AWS account. You can enable the trail through the AWS Management Console or using the CLI command:
aws cloudtrail start-logging --name your-trail-name
Replace "your-trail-name" with the name of the CloudTrail you created.
By following these steps, you can ensure compliance with the CISA Cyber Essentials requirement of having at least one multi-region AWS CloudTrail in your AWS account.