This rule ensures presence of at least one enabled trail in a specific region.
Rule | At least one enabled trail should be present in a region |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Low |
Rule Description
This rule enforces that there should be at least one enabled trail present in a specific region for compliance with the NIST 800-53 Revision 5 security standard. The NIST 800-53 Revision 5 provides guidelines and controls for securing federal information systems and organizations.
Troubleshooting Steps
If there is no enabled trail present in the specified region, follow these troubleshooting steps to ensure compliance with the rule:
aws cloudtrail describe-trails
Necessary Codes
No specific codes are required for this rule. However, you can use the following AWS CLI command to enable a trail if needed:
aws cloudtrail update-trail --name <trail_name> --is-multi-region-trail true --include-global-service-events --enable-log-file-validation
Replace
<trail_name>
with the name of the trail that needs to be enabled.Step-by-Step Guide for Remediation
Follow the steps below to remediate the issue and comply with the rule:
aws cloudtrail describe-trails --region <region_name>
aws cloudtrail create-trail --name <new_trail_name> --s3-bucket-name <bucket_name> --is-multi-region-trail true --include-global-service-events --enable-log-file-validation
Replace
<new_trail_name>
with a descriptive name for the trail and <bucket_name>
with the name of the S3 bucket where the trail logs will be stored.
5. Enable the newly created trail with the following CLI command:aws cloudtrail start-logging --name <new_trail_name>
aws cloudtrail describe-trails --region <region_name>
Note: It is recommended to review and configure the trail settings as per your organization's logging and compliance requirements.