This rule ensures that at least one enabled trail is present in a specific region for compliance.
Rule | At least one enabled trail should be present in a region |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Low |
Rule Description:
At least one enabled trail should be present in a specific region to comply with the NIST Cybersecurity Framework (CSF) v1. This rule ensures that AWS CloudTrail is properly configured to log events and monitor any suspicious activities related to your resources in the specified region. Enabling CloudTrail helps in maintaining security and meeting compliance requirements such as the NIST CSF.
Troubleshooting Steps:
Remediation Steps:
Follow the steps below to create and enable a CloudTrail trail in the specified region:
AWS Management Console:
AWS CLI:
aws cloudtrail create-trail --name CSF_Trail --s3-bucket-name <your_s3_bucket_name> --region <desired_region> --is-multi-region-trail
aws cloudtrail start-logging --name CSF_Trail
Please note that
<your_s3_bucket_name>
should be replaced with the name of your S3 bucket where CloudTrail logs will be stored, and <desired_region>
should be replaced with the desired AWS region code.Verification:
To verify if the CloudTrail trail is enabled and logging events in the specified region, follow these steps:
By following these steps, you can ensure compliance with the NIST Cybersecurity Framework (CSF) v1 by having at least one enabled trail in the specified region.