Control: AWS > CIS v1.4 > 3 - Logging
Covers recommendations for configuring AWS logging features.
Primary Policies
The following policies can be used to configure this control:
- 3 - Logging > 3.01 - Ensure CloudTrail is enabled in all regions (Automated)
- 3 - Logging > 3.02 - Ensure CloudTrail log file validation is enabled (Automated)
- 3 - Logging > 3.03 - Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible (Automated)
- 3 - Logging > 3.04 - Ensure CloudTrail trails are integrated with CloudWatch Logs (Automated)
- 3 - Logging > 3.05 - Ensure AWS Config is enabled in all regions (Automated)
- 3 - Logging > 3.06 - Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket (Automated)
- 3 - Logging > 3.07 - Ensure CloudTrail logs are encrypted at rest using KMS CMKs (Automated)
- 3 - Logging > 3.08 - Ensure rotation for customer created CMKs is enabled (Automated)
- 3 - Logging > 3.09 - Ensure VPC flow logging is enabled in all VPCs (Automated)
- 3 - Logging > 3.10 - Ensure that Object-level logging for write events is enabled for S3 bucket (Automated)
- 3 - Logging > 3.11 - Ensure that Object-level logging for read events is enabled for S3 bucket (Automated)
- 3 - Logging
- 3 - Logging > Maximum Attestation Duration
Category
In Your Workspace
Developers
- tmod:@turbot/aws-cisv1-4#/control/types/s03
- tmod:@turbot/cis#/control/categories/cis
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-cisv1-4#/control/types/s03"
Get Controls
Control Type URI
Category URI
GraphQL
CLI