This rule ensures the presence of at least one enabled trail in a specific region.
Rule | At least one enabled trail should be present in a region |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ Low |
Rule Description:
This rule ensures that there is at least one enabled trail present in a specified region to comply with the NIST 800-171 Revision 2 security framework. The NIST 800-171 Revision 2 provides guidelines for protecting the confidentiality of Controlled Unclassified Information (CUI) stored in nonfederal systems.
Troubleshooting Steps:
Necessary Code:
No code required for this particular rule.
Remediation:
To ensure compliance with the rule and meet the requirements of NIST 800-171 Revision 2, follow these steps:
Login to AWS Management Console: Access the AWS Management Console using the appropriate credentials.
Open CloudTrail service: Navigate to the CloudTrail service by searching for it in the services menu or by clicking here.
Choose the target region: Ensure that you are in the correct region for which the rule applies by selecting it from the region selector in the top right corner.
Verify existing trails: In the CloudTrail dashboard, review the list of existing trails displayed. If there are no trails or only disabled trails, continue to the next step.
Create a new trail: Click on the "Create Trail" button to create a new trail.
Specify settings for the trail:
a. Trail name: Provide an appropriate name for the trail, such as "ComplianceTrail".
b. Apply trail to all regions: Choose whether the trail should apply to all regions or only the current region.
c. Management events: Select the events you want to log for management operations.
d. Data events: Choose the S3 buckets and Lambda functions for which you want to log data events.
Enable the trail: Ensure that the "Enable log file validation" checkbox is checked, indicating that the trail will be enabled upon creation.
Specify storage location: Choose the appropriate Amazon S3 bucket to store the CloudTrail logs. You can create a new bucket or select an existing one.
Configure advanced settings: If necessary, configure advanced settings such as KMS encryption, CloudWatch Logs integration, or tags for the trail.
Review and create the trail: Double-check all the settings and configurations for the trail. Once satisfied, click on the "Create" button to create the trail.
Verify trail status: After a few minutes, revisit the CloudTrail dashboard and verify that the newly created trail is now enabled and its status is active.
Repeat if necessary: If you have multiple regions that require compliance with the NIST 800-171 Revision 2, repeat the above steps for each respective region.
CLI Command:
No CLI commands are necessary for this particular rule.