This rule ensures encryption of CloudTrail trail logs with KMS CMK for data security.
Rule | CloudTrail trail logs should be encrypted with KMS CMK |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Critical |
Rule Description
The rule requires enabling encryption for CloudTrail logs using a Key Management Service (KMS) Customer Master Key (CMK) that complies with the NIST 800-53 Revision 5 security controls.
Key Steps for Remediation
Follow the steps below to enable encryption for CloudTrail logs using the appropriate KMS CMK.
Step 1: Create a KMS Customer Managed Key
Step 2: Verify Trail Configuration
Step 3: Enable Encryption
Troubleshooting Steps
Issue: No KMS CMK Available
If you haven't created a KMS CMK or don't have a suitable one, follow these steps:
Issue: Trail Configuration Not Found
If you're unable to find the trail for CloudTrail, follow these steps:
Issue: Unable to Enable Encryption or Save Trail Configuration
If you encounter issues while enabling encryption or saving the trail configuration, ensure you have the necessary permissions. Check if you have the required IAM policy to perform these actions or contact your administrator for assistance.
Associated AWS CLI Command(s)
You can also use the AWS CLI to enable encryption for CloudTrail logs using the appropriate KMS CMK.
aws cloudtrail update-trail --name <trail_name> --kms-id <kms_cmk_arn>
Replace
<trail_name>
with the name of the CloudTrail trail and <kms_cmk_arn>
with the ARN of the KMS CMK.References