This rule ensures CloudTrail trails are integrated with CloudWatch logs.
Rule | CloudTrail trails should be integrated with CloudWatch logs |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ Critical |
Rule Description:
CloudTrail trails should be integrated with CloudWatch logs to maintain compliance with the NIST 800-171 Revision 2 security standard. This integration helps to improve visibility and monitor any suspicious activities or unauthorized access to AWS resources. By enabling this integration, organizations can meet the requirements for auditing and logging outlined in the NIST 800-171 security framework.
Troubleshooting Steps:
If there are any issues with integrating CloudTrail trails with CloudWatch logs, follow these troubleshooting steps:
Necessary Codes:
The following AWS CLI command can be used to enable integration between CloudTrail and CloudWatch Logs:
aws cloudtrail update-trail --name <trail-name> --cloud-watch-logs-delivery-enabled --cloud-watch-logs-log-group-arn <log-group-arn>
Replace
<trail-name>
with the name of the CloudTrail trail you want to integrate, and <log-group-arn>
with the ARN (Amazon Resource Name) of the CloudWatch log group where you want to store the logs.Step-by-Step Guide for Remediation:
Follow these steps to enable CloudTrail integration with CloudWatch Logs for NIST 800-171 Revision 2 compliance:
Note: The above steps assume that you have already set up a CloudWatch log group. If not, create a log group before enabling CloudTrail integration.
Remember to regularly review the logs and ensure proper retention and data protection measures are in place as per your organization's security policies.
By following these steps, you can successfully integrate CloudTrail trails with CloudWatch Logs to meet the logging and auditing requirements of the NIST 800-171 Revision 2 security standard.