Control: AWS > PCI v3.2.1 > CloudTrail > 2 CloudTrail should be enabled
This control checks whether CloudTrail is enabled in your AWS account.
However, some AWS services do not enable logging of all APIs and events. You should implement any additional audit trails other than CloudTrail and review the documentation for each service in CloudTrail Supported Services and Integrations.
Remediation
To create a new trail in CloudTrail
- Sign in to the AWS Management Console using the IAM user you configured for CloudTrail administration.
- Open the CloudTrail console at CloudTrail.
- In the Region selector, choose the AWS Region where you want your trail to be created. This is the Home Region for the trail.
- The Home Region is the only AWS Region where you can view and update the trail after it is created, even if the trail logs events in all AWS Regions.
- In the navigation pane, choose Trails.
- On the Trails page, choose Get Started Now. If you do not see that option, choose Create Trail.
- In Trail name, give your trail a name, such as My-Management-Events-Trail.
- As a best practice, use a name that quickly identifies the purpose of the trail. In this case, you're creating a trail that logs management events.
- In Management Events, make sure Read/Write events is set to All.
- In Data Events, do not make any changes. This trail will not log any data events.
- Create a new S3 bucket for the logs:
- In Storage Location, in Create a new S3 bucket, choose Yes.
- In S3 bucket, give your bucket a name, such as my-bucket-for-storing-cloudtrail-logs.
- The name of your S3 bucket must be globally unique. For more information about S3 bucket naming requirements, see the AWS CloudTrail User Guide.
- Under Advanced, choose Yes for both Encrypt log files with SSE-KMS and Enable log file validation.
- Choose Create.
PCI requirement(s): 10.1, 10.2.1, 10.2.2, 10.2.3, 10.2.4, 10.2.5, 10.2.6, 10.2.7, 10.3.1, 10.3.2, 10.3.3, 10.3.4, 10.3.5, 10.3.6
Resource Types
This control targets the following resource types:
Category
In Your Workspace
Developers
- tmod:@turbot/aws-pciv3-2-1#/control/types/cloudTrailEnabledAllRegions
- tmod:@turbot/turbot#/control/categories/compliancePci
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-pciv3-2-1#/control/types/cloudTrailEnabledAllRegions"
Get Controls
Control Type URI
Category URI
GraphQL
CLI