This rule ensures CloudTrail trail logs are encrypted with KMS CMK for enhanced security.
Rule | CloudTrail trail logs should be encrypted with KMS CMK |
Framework | CISA-cyber-essentials |
Severity | ✔ Critical |
Ensuring CloudTrail Trail Logs are Encrypted with AWS KMS CMK in Compliance with CISA Cyber Essentials
AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. The CISA Cyber Essentials encourages the encryption of sensitive data to protect the integrity and confidentiality of information.
AWS CloudTrail Log Encryption with KMS CMK
When you create a trail, you can configure it to encrypt log files using AWS Key Management Service (KMS) keys. AWS KMS is a managed service that makes it easy for you to create and control the keys used for cryptographic operations.
Rule/Policy Details
CloudTrail logs should be encrypted with a customer-managed AWS KMS Customer Master Key (CMK) rather than the default AWS managed key for CloudTrail. Using a customer-managed CMK gives you more flexibility, including key rotation and the policy modification.
Benefits:
Prerequisites:
Step by Step Guide for Remediation
Step 1: Verify Current CloudTrail Encryption
Step 2: Create a Customer-Managed CMK (if necessary)
CLI command to create a CMK:
aws kms create-key --description "CloudTrail encryption key"
After creating the key, record the
KeyId
or Arn
from the output.Step 3: Update CloudTrail to Use the Customer-Managed CMK
CLI command to update a trail:
aws cloudtrail update-trail --name YourTrailName --kms-key-id alias/YourKeyAlias
Replace
YourTrailName
with the name of your CloudTrail trail and YourKeyAlias
with the alias of your KMS CMK.Monitoring and Troubleshooting
To monitor the usage of your CMK and troubleshoot any potential issues, you can use AWS CloudTrail logs to record key usage. Look for the
Encrypt
and Decrypt
API calls in the logs associated with your CMK.If issues arise with encryption or if CloudTrail logs are not being created:
Additional Recommendations
This guide aims to be precise, applying the necessary steps without extraneous information, fulfilling search optimization requirements without sacrificing quality or readability.