Table for Unconfigured Data Events Logging in CloudTrail Trails

Category

Details

Definition

Data events capture object-level API activity (e.g., S3 object access, Lambda function invocation).

Unconfigured Logging

When data events logging is not enabled, CloudTrail does not log these activities.

Risks

Lack of visibility into data access, potential undetected unauthorized or malicious activities.

Impacted Services

AWS S3, AWS Lambda, DynamoDB, and other services with object-level APIs.

Key Indicators

Absence of specific logs for actions like GetObject, PutObject, or InvokeFunction.

Mitigation Steps

Enable data events logging in CloudTrail for the relevant trails.

Configuration Steps

1. Open CloudTrail console. 2. Select a trail. 3. Enable data events for the target resources.

Best Practices

1. Regularly review and enable data events for sensitive resources. 2. Use IAM policies to restrict access to critical resources.

Compliance

Essential for meeting compliance standards like PCI DSS, HIPAA, or SOC 2.

Additional Tools

AWS Config, Security Hub, or third-party monitoring tools for visibility and alerts.

Last updated

Was this helpful?