This rule ensures that CloudTrail trails are integrated with CloudWatch logs for better monitoring and security.
Rule | CloudTrail trails should be integrated with CloudWatch logs |
Framework | FedRAMP Low Revision 4 |
Severity | ✔ Critical |
Rule Description:
The CloudTrail trails within an AWS account should be integrated with CloudWatch logs to ensure compliance with the Federal Risk and Authorization Management Program (FedRAMP) Low Revision 4 requirements. This integration enables the tracking and monitoring of API activities and events happening within the account.
Troubleshooting Steps:
Necessary Codes:
No specific codes are required for this rule. However, you might need to use AWS Command Line Interface (CLI) commands to perform the CloudTrail and CloudWatch logs integration.
Step-by-Step Guide for Remediation:
Log in to the AWS Management Console using appropriate credentials.
Search for and open the "CloudTrail" service.
Check if CloudTrail is already enabled for your account. If it is not enabled, follow these steps to enable it:
Now, check if there are any existing CloudWatch log groups available. If not, follow these steps to create a log group:
Grant the necessary IAM permissions to integrate CloudTrail with CloudWatch logs:
Now, associate the CloudTrail trail with the CloudWatch log group:
Verify if the CloudTrail and CloudWatch logs integration is successful by checking if logs are being generated in the CloudWatch log group associated with the trail.
Conclusion:
By following the above step-by-step guide, you should be able to integrate CloudTrail trails with CloudWatch logs to meet the FedRAMP Low Revision 4 requirements. This integration allows for improved monitoring and tracking of API activities and events within your AWS account.