This rule ensures presence of a multi-region AWS CloudTrail in an account.
Rule | At least one multi-region AWS CloudTrail should be present in an account |
Framework | CISA-cyber-essentials |
Severity | ✔ Medium |
Rule Description
This rule mandates the presence of at least one multi-region AWS CloudTrail in an account as part of the CISA Cyber Essentials program. AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. Multi-region CloudTrail provides enhanced security by tracking events from multiple AWS regions, ensuring comprehensive monitoring and centralized management.
Troubleshooting Steps
1. Verify existing CloudTrail configuration
2. Evaluate the CloudTrail existing trail
3. Create a new multi-region CloudTrail trail (if required)
4. Enable CloudTrail logging for all regions
Necessary Code
There are no specific code snippets for this rule. The configuration steps mentioned above can be performed through the AWS Management Console.
Remediation Steps
To remediate the missing multi-region AWS CloudTrail issue, follow these steps:
Verify Existing CloudTrail Configuration:
Create a new multi-region CloudTrail trail (if required):
Enable CloudTrail logging for all regions:
By following these steps, you will ensure the presence of a multi-region AWS CloudTrail in your account, providing comprehensive monitoring and meeting the requirements of the CISA Cyber Essentials program.