3.2 Ensure CloudTrail log file validation is enabled

Information

CloudTrail log file validation creates a digitally signed digest file containing a hash of each log that CloudTrail writes to S3. These digest files can be used to determine whether a log file was changed, deleted, or remained unchanged after CloudTrail delivered the log. It is recommended that file validation be enabled for all CloudTrails.

Enabling log file validation will provide additional integrity checks for CloudTrail logs.

Solution

Perform the following to enable log file validation on a given trail:

From Console:

- Sign in to the AWS Management Console and open the IAM console at

https://console.aws.amazon.com/cloudtrail

.
- Click on Trails in the left navigation pane.
- Click on the target trail.
- Within the General details section, click edit
- Under Advanced settings check the enable box under Log file validation
- Click Save changes

From Command Line:

Enable log file validation on a trail:

aws cloudtrail update-trail --name <trail_name> --enable-log-file-validation

Note that periodic validation of logs using these digests can be carried out by running the following command:

aws cloudtrail validate-logs --trail-arn <trail_arn> --start-time <start_time> --end-time <end_time>

See Also

https://workbench.cisecurity.org/benchmarks/19631

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-6, 800-53|AU-6(1), 800-53|AU-7(1), CSCv7|6.1

Plugin: amazon_aws

Control ID: a673160d176f9a95766e950e8d35bc6378165e056cd5e047c79ed43fd6c1196c