Control: All S3 buckets should log S3 data events in CloudTrail
Description
The collection of Simple Storage Service (AWS S3) data events helps in detecting any anomalous activity. The details include AWS account information that accessed an AWS S3 bucket, IP address, and time of event.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.cloudtrail_s3_data_events_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.cloudtrail_s3_data_events_enabled --share
SQL
This control uses a named query:
cloudtrail_s3_data_events_enabled