Plugin Title | CloudTrail Encryption |
Cloud | AWS |
Category | CloudTrail |
Description | Ensures CloudTrail encryption at rest is enabled for logs |
More Info | CloudTrail log files contain sensitive information about an account and should be encrypted at rest for additional protection. |
AWS Link | http://docs.aws.amazon.com/awscloudtrail/latest/userguide/encrypting-cloudtrail-log-files-with-aws-kms.html |
Recommended Action | Enable CloudTrail log encryption through the CloudTrail console or API |
- Log into the AWS Management Console.
- Select the "Services" option and search for "CloudTrail".
- In the "Dashboard" panel click on "View trails" button.
- Select the "trail" that needs to be verified under "Name" column.
- Scroll down and under the "Storage location" option check for "Encrypt log files with SSE-KMS". If its status is "No" the selected trail does not support log encryption.
- Click on the pencil icon to get into "Storage location" configuration settings. Scroll down and click on "Yes" next to "Encrypt log files with SSE-KMS" to enable the "CloudTrail" log encryption.
- Click on the "Yes" option next to "Create a new KMS key" and enter a name. Make sure KMS key and S3 bucket must be in the same region.
- Click on "No" option next to "Create a new KMS key" if already have "KMS key" available.
- Scroll down and click on "Save" to enable the CloudTrail log encryption.