Policy: AWS > CIS v2.0 > 3 - Logging
Covers recommendations for configuring AWS logging features.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 3.01 - Ensure CloudTrail is enabled in all regions
- 3.02 - Ensure CloudTrail log file validation is enabled
- 3.03 - Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible
- 3.04 - Ensure CloudTrail trails are integrated with CloudWatch Logs
- 3.05 - Ensure AWS Config is enabled in all regions
- 3.06 - Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket
- 3.07 - Ensure CloudTrail logs are encrypted at rest using KMS CMKs
- 3.08 - Ensure rotation for customer created symmetric CMKs is enabled
- 3.09 - Ensure VPC flow logging is enabled in all VPCs
- 3.10 - Ensure that Object-level logging for write events is enabled for S3 bucket
- 3.11 - Ensure that Object-level logging for read events is enabled for S3 bucket
- Maximum Attestation Duration
Controls
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/aws-cisv2-0#/policy/types/s03
- turbot graphql policy-type --id "tmod:@turbot/aws-cisv2-0#/policy/types/s03"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-cisv2-0#/policy/types/s03"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI