Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Policy Packs
AWS CIS v3.0.0 - Section 3 - Logging
  • AWS > CloudTrail > Trail > Encryption at Rest
  • AWS > CloudTrail > Trail > Encryption at Rest > Customer Managed Key
  • AWS > CloudTrail > Trail > Log File Validation
  • AWS > Config > Configuration Recording
  • AWS > KMS > Key > Rotation
  • AWS > S3 > Bucket > Access Logging
  • AWS > S3 > Bucket > Access Logging > Bucket
  • AWS > Turbot > Audit Trail
  • AWS > Turbot > Audit Trail > CloudTrail > Trail > Encryption Key
  • AWS > Turbot > Audit Trail > CloudTrail > Trail > Event Selectors
  • AWS > Turbot > Audit Trail > CloudTrail > Trail > Global Region
  • AWS > Turbot > Audit Trail > CloudTrail > Trail > S3 Bucket
  • AWS > Turbot > Audit Trail > CloudTrail > Trail > Type
  • AWS > Turbot > Logging > Bucket
  • AWS > Turbot > Logging > Bucket > Encryption in Transit
  • AWS > VPC > VPC > Flow Logging
Get Involved
Discuss on Slack

Policy Setting: AWS > Turbot > Audit Trail > CloudTrail > Trail > Global Region

Policies

This policy setting is dependent on the following policy types:

  • AWS > Turbot > Audit Trail > CloudTrail > Trail > Global Region

Source

resource "turbot_policy_setting" "aws_trail_global_region" {
resource = turbot_policy_pack.main.id
type = "tmod:@turbot/aws#/policy/types/trailGlobalRegion"
note = "AWS CIS v3.0.0 - Controls: 3.1"
value = "us-east-1"
}
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy