Policy: AWS > Well-Architected Tool > AWS Well-Architected Framework > Security > SEC 04. How do you detect and investigate security events? > Configure service and application logging
Configure logging throughout the workload, including application logs, resource logs, and AWS service logs. For example, ensure that AWS CloudTrail, Amazon CloudWatch Logs, Amazon GuardDuty and AWS Security Hub are enabled for all accounts within your organization.
See Configure service and application logging for more information.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
- AWS > Well-Architected Tool > AWS Well-Architected Framework > Security
- AWS > Well-Architected Tool > AWS Well-Architected Framework > Security > SEC 04. How do you detect and investigate security events?
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/other
- tmod:@turbot/aws-wellarchitected-framework#/policy/types/sec04AppServiceLogging
- turbot graphql policy-type --id "tmod:@turbot/aws-wellarchitected-framework#/policy/types/sec04AppServiceLogging"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-wellarchitected-framework#/policy/types/sec04AppServiceLogging"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI