This rule ensures CloudTrail trails are integrated with CloudWatch Logs.
Rule | CloudTrail trails should be integrated with CloudWatch Logs |
Framework | PCI v3.2.1 |
Severity | ✔ Low |
Rule Description
The rule states that CloudTrail trails should be integrated with CloudWatch Logs for PCI v3 compliance. This integration helps to monitor and analyze the API activity in your AWS account, which is important for maintaining the security and compliance standards required by the Payment Card Industry Data Security Standard (PCI DSS) version 3.
Troubleshooting Steps
If the integration between CloudTrail and CloudWatch Logs is not properly set up or functioning, you may encounter issues with monitoring and analyzing the API activity in your AWS account. Here are some troubleshooting steps you can follow:
Necessary Codes
If the CloudTrail trail is not already integrated with CloudWatch Logs, you will need to create or update the necessary configuration using AWS Command Line Interface (CLI) commands or AWS Management Console. Here are the steps to perform using CLI commands:
Create a CloudWatch Log Group (if not already created)
aws logs create-log-group --log-group-name <log-group-name>
Create or update CloudTrail Trail to integrate with CloudWatch Logs
aws cloudtrail update-trail --name <trail-name> --cloud-watch-logs-log-group-arn <log-group-arn> --cloud-watch-logs-role-arn <role-arn>
Replace
<log-group-name>
with the desired CloudWatch log group name, <trail-name>
with the name of the CloudTrail trail, <log-group-arn>
with the ARN of the CloudWatch log group, and <role-arn>
with the ARN of the IAM role associated with the CloudTrail trail.Remediation Steps
To ensure compliance with the PCI v3 rule, you should follow these step-by-step remediation instructions:
By following these steps, you can ensure that your CloudTrail trails are integrated with CloudWatch Logs for PCI v3 compliance and have a robust monitoring system in place for your AWS account.