Ensure that your Amazon CloudTrail trails are configured to log data events in order to record S3 object-level API operations such as "GetObject", "DeleteObject" and "PutObject", for individual S3 buckets or for all existing and future buckets provisioned within your AWS cloud account.
This rule can help you with the following compliance standards:
- APRA
- MAS
- NIST4
For further details on compliance standards supported by Conformity, see here.
This rule can help you work with the AWS Well-Architected Framework.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
Enabling CloudTrail data event logging will help you meet data compliance requirements within your organization, perform comprehensive security analysis, monitor specific patterns of user behavior in your AWS cloud account, or take immediate actions on any object-level API activity using Amazon CloudWatch Events.
Audit
To identify any CloudTrail trails that are missing the capability to log data events, perform the following actions:
Remediation / Resolution
To enable data events for your existing Amazon CloudTrail trails, perform the following actions:
References
- AWS Documentation
- AWS CloudTrail FAQs
- What Is AWS CloudTrail?
- Updating a Trail
- AWS Command Line Interface (CLI) Documentation
- cloudtrail
- list-trails
- get-event-selectors
- put-event-selectors
- CloudFormation Documentation
- AWS CloudTrail resource type reference
- Terraform Documentation
- AWS Provider
Unlock the Remediation Steps
Free 30-day Trial
Automatically audit your configurations with Conformity
and gain access to our cloud security platform.
You are auditing:
CloudTrail Data Events
Risk Level: Low