turbot/steampipe-mod-aws-compliance

Benchmark: 500.06 Audit Trail

Description

Each covered entity shall securely maintain systems that, to the extent applicable and based on its risk assessment: (1) are designed to reconstruct material financial transactions sufficient to support normal operations and obligations of the covered entity; and (2) include audit trails designed to detect and respond to cybersecurity events that have a reasonable likelihood of materially harming any material part of the normal operations of the covered entity. (b) Each covered entity shall maintain records required by paragraph (a)(1) of this section for not fewer than five years and shall maintain records required by paragraph (a)(2) of this section for not fewer than three years.

Usage

Install the mod:

mkdir dashboards
cd dashboards
powerpipe mod init
powerpipe mod install github.com/turbot/steampipe-mod-aws-compliance

Start the Powerpipe server:

steampipe service start
powerpipe server

Open http://localhost:9033 in your browser and select 500.06 Audit Trail.

Run this benchmark in your terminal:

powerpipe benchmark run aws_compliance.benchmark.nydfs_23_500_06

Snapshot and share results via Turbot Pipes:

powerpipe benchmark run aws_compliance.benchmark.nydfs_23_500_06 --share

Benchmarks

Tags