Table for CloudTrail Trails Not Encrypted with Customer KMS

This table provides an overview of important information regarding CloudTrail trails that are not encrypted with a customer-managed KMS key. It is intended for IT and Security Engineers responsible for ensuring compliance and security in cloud environments.

Aspect

Details

Issue

CloudTrail trails are not encrypted using a Customer Managed Key (CMK) from AWS KMS.

Impact

Potential exposure of sensitive audit logs to unauthorized access or tampering.

Recommended Action

Enable encryption for CloudTrail logs using a CMK to enhance security and access control.

Steps to Remediate

1. Identify CloudTrail trails without CMK encryption.

2. Update the trail configuration to use a CMK for encryption.

3. Ensure IAM policies allow CloudTrail to access the CMK.

Verification

Use the AWS Management Console, CLI, or SDK to verify CMK encryption status of trails.

Tools

AWS Management Console, AWS CLI, AWS Config, Security Hub, or third-party compliance tools.

Compliance Standards

Ensures adherence to compliance frameworks such as PCI DSS, HIPAA, and SOC 2.

AWS Best Practices

Encrypt CloudTrail logs with a CMK to meet AWS security best practices.

Audit Commands

aws cloudtrail describe-trails --query 'trailList[*].KmsKeyId'

Log Verification

Check S3 bucket policies and KMS key usage in AWS CloudTrail event history.

Alerting

Configure AWS Config Rules or Security Hub findings to monitor non-compliant trails.

Last updated

Was this helpful?