This rule ensures the presence of at least one multi-region AWS CloudTrail in an account.
Rule | At least one multi-region AWS CloudTrail should be present in an account |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Medium |
Rule Description:
To align with the NIST Cybersecurity Framework (CSF) v1, it is essential to have at least one multi-region AWS CloudTrail enabled in an account. AWS CloudTrail provides a comprehensive audit trail of all API actions and resource activities performed within an AWS account. A multi-region setup ensures that the CloudTrail logs are stored redundantly across multiple AWS regions, providing additional resilience and enabling better detection of potential security incidents or unauthorized activities.
Remediation Steps:
To comply with this rule/policy, follow these steps:
Step 1: Access the AWS Management Console
Step 2: Navigate to AWS CloudTrail
Step 3: Create a new Trail
Step 4: Configure the Trail settings
Step 5: Enable the Trail
Troubleshooting Steps (if required):
If you encounter any issues during the process, consider the following troubleshooting steps:
If the troubleshooting steps above do not resolve the issue, it is recommended to consult the official AWS documentation or contact AWS Support for further assistance.
Additional Notes: