teerth04 / ticket

Other
0 stars 0 forks source link

2.4 Ensure CloudTrail trails are integrated with CloudWatch Logs #1108

Open armorcodegithubapp[bot] opened 1 year ago

armorcodegithubapp[bot] commented 1 year ago

AWS CloudTrail is a web service that records AWS API calls made in a given AWS account. CloudTrail uses Amazon S3 for log file storage and delivery, so log files are stored durably. In addition to capturing CloudTrail logs within a specified S3 bucket for long term analysis, realtime analysis can be performed by configuring CloudTrail to send logs to CloudWatch Logs. It is recommended that CloudTrail logs be sent to CloudWatch Logs.

Type: [Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark]

Compliance Status: FAILED

Product Name: N/A

Company Name: N/A

Generator Id: arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule/2.4

Record State: ACTIVE

Workflow Status: NEW

Workflow State: NEW

Account Id: 012345678912

Region: N/A

Source URL: N/A

Resource: [ { "Type" : "AwsAccount", "Id" : "AWS::::Account:012345678912", "Partition" : "aws", "Region" : "us-east-1" } ]

Mitigation: For directions on how to fix this issue, please consult the AWS Security Hub CIS documentation. https://docs.aws.amazon.com/console/securityhub/standards-cis-2.4/remediation

Finding Id : 109160720

armorcodegithubapp[bot] commented 1 year ago

Finding 109160720 is mitigated by SYSTEM via ArmorCode Platform