turbot/aws_compliance

Control: Ensure the S3 bucket CloudTrail logs to is not publicly accessible

Description

CloudTrail logs a record of every API call made in your account. These log files are stored in an S3 bucket. Security Hub recommends that the S3 bucket policy, or access control list (ACL), be applied to the S3 bucket that CloudTrail logs to prevent public access to the CloudTrail logs.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.cloudtrail_bucket_not_public

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.cloudtrail_bucket_not_public --share

SQL

This control uses a named query:

cloudtrail_bucket_not_public

Tags