turbot/steampipe-mod-aws-compliance

Control: S3 bucket logging should be enabled

Description

AWS Simple Storage Service (AWS S3) server access logging provides a method to monitor the network for potential cybersecurity events.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.s3_bucket_logging_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.s3_bucket_logging_enabled --share

SQL

This control uses a named query:

select
arn as resource,
case
when logging -> 'TargetBucket' is null then 'alarm'
else 'ok'
end as status,
case
when logging -> 'TargetBucket' is null then title || ' logging disabled.'
else title || ' logging enabled.'
end as reason
, region, account_id
from
aws_s3_bucket;

Tags