Control: 4 Amazon Redshift clusters should have audit logging enabled
Description
This control checks whether an Amazon Redshift cluster has audit logging enabled.
Amazon Redshift audit logging provides additional information about connections and user activities in your cluster. This data can be stored and secured in Amazon S3 and can be helpful in security audits and investigations.
Remediation
To enable cluster audit logging.
To modify the snapshot retention period
- Open the Amazon Redshift console.
- In the navigation menu, choose
Clusters
, then choose the name of the cluster to modify. - Choose
Maintenance and monitoring
. - Under
Audit logging
, chooseEdit
. - Set
Enable audit logging
toyes
, then enter the log destination bucket details. - Choose
Confirm
.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.foundational_security_redshift_4
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.foundational_security_redshift_4 --share
SQL
This control uses a named query:
redshift_cluster_automatic_snapshots_min_7_days