This rule states that at least one multi-region AWS CloudTrail should be present in an account.
Rule | At least one multi-region AWS CloudTrail should be present in an account |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Rule Description:
For compliance with NIST 800-53 Revision 5, it is required to have at least one multi-region AWS CloudTrail present in every AWS account. A multi-region CloudTrail provides enhanced visibility into account activity and enables tracking of actions across multiple AWS regions. This rule ensures that logs are not dependent on a single region and helps in identifying any possible unauthorized activities.
Troubleshooting Steps:
If you find that there is no multi-region AWS CloudTrail present in your AWS account, follow the troubleshooting steps below to rectify the issue:
Check if CloudTrail is enabled in the AWS Management Console:
Verify if the CloudTrail trail is configured for multi-region mode:
Verify if the desired regions are selected for the trail:
Troubleshoot any log delivery issues:
Necessary Codes:
No specific codes are required for this rule.
Step-by-step Guide for Remediation:
Follow the steps below to add a multi-region AWS CloudTrail to comply with NIST 800-53 Revision 5:
Open the AWS Management Console and sign in to your account.
Go to the CloudTrail service.
If CloudTrail is not enabled, click on "Create Trail."
Provide a name for the trail and select the desired logging options.
In the "Management events" section, select the option "All" or choose specific management events to log.
Configure the data events logging based on your requirements.
In the "Storage location" section, select an existing S3 bucket or create a new one to store the logs.
Enable the "Multi-Region" option in the trail settings for enhanced visibility.
Select the desired AWS regions for the trail to monitor.
Configure advanced settings like encryption, tagging, and log file validation based on your security and compliance needs.
Review the trail settings and click on "Create" to create the multi-region CloudTrail.
Verify if the CloudTrail is successfully created and active.
Monitor the CloudTrail logs periodically to ensure they are capturing the required activities.
Note: It is recommended to regularly review and update your CloudTrail configuration as per your organization's security requirements and compliance standards.