Ensure that your Amazon CloudTrail logs are encrypted at rest using Server-Side Encryption provided by Key Management Service (KMS) to enhance the security of your CloudTrail bucket and allow you to have better control over who can read the CloudTrail log files within your organization.
This rule can help you with the following compliance standards:
- CISAWSF
- PCI
- HIPAA
- GDPR
- APRA
- MAS
- NIST4
For further details on compliance standards supported by Conformity, see here.
This rule can help you work with the AWS Well-Architected Framework.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
Enabling Amazon CloudTrail log file encryption using SSE-KMS will facilitate a strong security layer that is directly manageable by you using your own Customer Master Keys (CMKs) rather than allowing Amazon S3 to manage it by default using S3-Managed Encryption Keys (SSE-S3).
Audit
To determine if your Amazon CloudTrail trails are configured to encrypt log files using SSE-KMS, perform the following actions:
Remediation / Resolution
To enable SSE-KMS encryption for your existing Amazon CloudTrail trails, perform the following actions:
References
- AWS Documentation
- AWS CloudTrail FAQs
- CloudTrail Concepts
- Configure AWS KMS key policies for CloudTrail
- Updating a trail to use your KMS key
- Encrypting CloudTrail log files with AWS KMS keys (SSE-KMS)
- What Is AWS CloudTrail?
- Creating a trail for your AWS account
- Creating, updating, and managing trails with the AWS Command Line Interface
- AWS Command Line Interface (CLI) Documentation
- cloudtrail
- list-trails
- describe-trails
- update-trail
- kms
- create-key
- create-alias
- CloudFormation Documentation
- AWS CloudTrail resource type reference
- Terraform Documentation
- AWS Provider
Unlock the Remediation Steps
Free 30-day Trial
Automatically audit your configurations with Conformity
and gain access to our cloud security platform.
You are auditing:
CloudTrail Logs Encrypted
Risk Level: Medium