This rule ensures logging of S3 data events in CloudTrail for all S3 buckets.
Rule | All S3 buckets should log S3 data events in CloudTrail |
Framework | FedRAMP Low Revision 4 |
Severity | ✔ Medium |
Rule Description
The rule ensures that all S3 buckets within the AWS account are configured to log S3 data events in AWS CloudTrail. This rule is specific to the FedRAMP Low security standard, Revision 4.
Troubleshooting Steps
If any S3 buckets are not logging S3 data events in CloudTrail, follow these troubleshooting steps:
Verify CloudTrail is enabled: Ensure that CloudTrail is enabled in the AWS account. To confirm this, navigate to the AWS Management Console and search for "CloudTrail". If it is not enabled, follow the AWS documentation to enable CloudTrail.
Check CloudTrail bucket permissions: Make sure that the S3 bucket used for CloudTrail logging has the necessary permissions. Ensure that the IAM role associated with CloudTrail has appropriate write permissions to the S3 bucket. Refer to the AWS documentation for details on setting up CloudTrail bucket permissions.
Verify CloudTrail trails: Check if the appropriate CloudTrail trail(s) are configured for the S3 buckets. Validate the trail configuration to ensure that it includes S3 data events. Verify that the trails are active and logging events correctly.
Necessary Code (if any)
No specific code is required for ensuring S3 buckets log S3 data events in CloudTrail. However, you may need to utilize AWS Command Line Interface (CLI) commands for troubleshooting or verifying the configuration.
Step-by-step Guide for remediation
Follow the steps below to remediate S3 buckets not logging S3 data events in CloudTrail:
Verify CloudTrail is enabled:
Check CloudTrail bucket permissions:
Verify CloudTrail trails:
Note: It's recommended to periodically perform audits and checks to ensure ongoing compliance with the rule.