This rule ensures that CloudTrail trail logs are encrypted with KMS CMK for enhanced security.
Rule | CloudTrail trail logs should be encrypted with KMS CMK |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ Critical |
Rule Description:
This rule or policy ensures that CloudTrail trail logs are encrypted using a Key Management Service (KMS) Customer Master Key (CMK) that adheres to the NIST 800-53 Revision 5 security standards. Encrypting the trail logs adds an additional layer of protection to prevent unauthorized access or tampering of the logs. By using KMS CMK, you can centrally manage and control access to the encryption keys.
Troubleshooting Steps (if applicable):
Necessary Codes (if applicable):
There are no specific codes required for this rule; instead, it involves configuration and encryption settings within the AWS Management Console or AWS CLI.
Step-by-Step Guide for Remediation:
Option 1: AWS Management Console
Option 2: AWS CLI
aws cloudtrail update-trail --name [TRAIL_NAME] --kms-key-id [KMS_CMK_ID] --is-organization-trail [true|false] --regions [AWS_REGIONS]
Replace the placeholders:
us-east-1,us-west-2
).Example command:
aws cloudtrail update-trail --name my-trail --kms-key-id 12345678-1234-1234-1234-123456789012 --is-organization-trail false --regions us-east-1
aws cloudtrail describe-trails --trail-name-list [TRAIL_NAME]
Replace the placeholder:
Example command:
aws cloudtrail describe-trails --trail-name-list my-trail
Confirm that the trail logs are now encrypted using the specified KMS CMK.
Note: Remember to replace the placeholder values with your actual values according to your AWS environment.
By following these steps, you can ensure that your CloudTrail trail logs are encrypted using a KMS CMK that adheres to the NIST 800-53 Revision 5 standards.