Control: 2 CloudTrail should have encryption at rest enabled
Description
This control checks whether AWS CloudTrail is configured to use the server-side encryption (SSE) AWS KMS customer master key (CMK) encryption.
If you are only using the default encryption option, you can choose to disable this check.
Remediation
To enable encryption for CloudTrail logs
- Open the CloudTrail console at CloudTrail.
- Choose Trails.
- Choose the trail to update.
- Under General details, choose Edit.
- For Log file SSE-KMS encryption, select Enabled.
- Under AWS KMS customer managed CMK, do one of the following:
- To create a key, choose New. Then in AWS KMS alias, enter an alias for the key. The key is created in the same Region as the S3 bucket.
- To use an existing key, choose Existing and then from AWS KMS alias, select the key.
- The AWS KMS key and S3 bucket must be in the same Region.
- Choose Save changes.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.foundational_security_cloudtrail_2
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.foundational_security_cloudtrail_2 --share
SQL
This control uses a named query:
cloudtrail_trail_logs_encrypted_with_kms_cmk