This rule states that at least one multi-region AWS CloudTrail should be present in an account.
Rule | At least one multi-region AWS CloudTrail should be present in an account |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Medium |
Ensuring Compliance with NIST 800-53 Revision 5 Using AWS CloudTrail
To comply with the National Institute of Standards and Technology (NIST) Special Publication 800-53 Revision 5, organizations must implement certain security controls when using cloud services. One such control involves the use of AWS CloudTrail for monitoring, logging, and continuous security auditing.
Understanding the Requirement
NIST 800-53 Rev. 5 emphasizes the need for comprehensive logging and tracking of events that could affect security and privacy. AWS CloudTrail enables governance, compliance, operational auditing, and risk auditing of your AWS account.
A multi-region AWS CloudTrail ensures that activities across all regions are recorded, which is crucial for identifying and responding to security incidents.
Creating a Multi-Region CloudTrail
Step 1: Verify Existing Trails
First, check if there is an existing multi-region Trail.
aws cloudtrail describe-trails --query 'trailList[].{Name:Name, HomeRegion:HomeRegion, MultiRegionTrail:IsMultiRegionTrail}'
Step 2: Create a New CloudTrail
If a multi-region trail does not exist, create one.
aws cloudtrail create-trail --name MyMultiRegionTrail --is-multi-region-trail --include-global-service-events --enable-log-file-validation --s3-bucket-name my-cloudtrail-logs
Replace
MyMultiRegionTrail
with a name for your trail, and my-cloudtrail-logs
with your S3 bucket name.Step 3: Start Logging
After creating the trail, start logging all events from all regions:
aws cloudtrail start-logging --name MyMultiRegionTrail
Step 4: Configure CloudTrail Settings
Remediation Steps if Multi-region Trail is Inactive
If you discover that your multi-region AWS CloudTrail is not active:
Step 1: Identify Disabled Trails
aws cloudtrail describe-trails --query 'trailList[?IsMultiRegionTrail==`true` && Status.isLogging==`false`]'
Step 2: Start Logging on Disabled Trails
For each disabled trail, start logging again:
aws cloudtrail start-logging --name InactiveTrailName
Replace
InactiveTrailName
with the name of your inactive trail. Repeat for all inactive trails.Monitoring CloudTrail
Utilize Amazon CloudWatch or Amazon Athena to continually monitor CloudTrail logs for suspicious activities. Setup alarms and notifications for events that could indicate security risks.
Avoiding Common Configuration Issues
Keep the following best practices in mind to prevent configuration issues:
By following these guidelines, you will help ensure that your AWS account is compliant with NIST 800-53 Revision 5 using AWS CloudTrail, enhancing your overall security posture in the cloud.