Policy Packs
AWS CIS v3.0.0 - Section 3 - Logging

Policy Settings

The AWS CIS v3.0.0 - Section 3 - Logging policy pack has 16 policy settings:

PolicySettingNote
AWS > CloudTrail > Trail > Encryption at RestCheck: Encryption at Rest > Customer Managed KeyAWS CIS v3.0.0 - Controls: 3.5
AWS > CloudTrail > Trail > Encryption at Rest > Customer Managed Keyalias/turbot/defaultAWS CIS v3.0.0 - Controls: 3.5
AWS > CloudTrail > Trail > Log File ValidationCheck: EnabledAWS CIS v3.0.0 - Controls: 3.2
AWS > Config > Configuration RecordingCheck: ConfiguredAWS CIS v3.0.0 - Controls: 3.3
AWS > KMS > Key > RotationCheck: EnabledAWS CIS v3.0.0 - Controls: 3.6
AWS > S3 > Bucket > Access LoggingCheck: Enabled to Access Logging > BucketAWS CIS v3.0.0 - Controls: 3.4
AWS > S3 > Bucket > Access Logging > BucketCalculatedAWS CIS v3.0.0 - Controls: 3.4
AWS > Turbot > Audit TrailCheck: ConfiguredAWS CIS v3.0.0 - Controls: 3.1
AWS > Turbot > Audit Trail > CloudTrail > Trail > Encryption KeyCalculatedAWS CIS v3.0.0 - Controls: 3.1
AWS > Turbot > Audit Trail > CloudTrail > Trail > Event Selectorsevent_selector { read_write_type = "All" include_management_events = true data_resource { type = "AWS::S3::Object" values = ["arn:aws:s3"] } } AWS CIS v3.0.0 - Controls: 3.1 & 3.8 & 3.9
AWS > Turbot > Audit Trail > CloudTrail > Trail > Global Regionus-east-1AWS CIS v3.0.0 - Controls: 3.1
AWS > Turbot > Audit Trail > CloudTrail > Trail > S3 BucketCalculatedAWS CIS v3.0.0 - Controls: 3.1
AWS > Turbot > Audit Trail > CloudTrail > Trail > TypeA multi-region trail in the `Trail > Global Region` in each accountAWS CIS v3.0.0 - Controls: 3.1
AWS > Turbot > Logging > BucketCheck: ConfiguredAWS CIS v3.0.0 - Controls: 3.1
AWS > Turbot > Logging > Bucket > Encryption in TransitEnabledAWS CIS v3.0.0 - Controls: 3.1
AWS > VPC > VPC > Flow LoggingCheck: Configured per `Flow Logging > *`AWS CIS v3.0.0 - Controls: 3.7