teerth04 / ticket

Other
0 stars 0 forks source link

2.4 Ensure CloudTrail trails are integrated with CloudWatch Logs #1504

Open armorcodegithubpreprod[bot] opened 11 months ago

armorcodegithubpreprod[bot] commented 11 months ago

AWS CloudTrail is a web service that records AWS API calls made in a given AWS account. CloudTrail uses Amazon S3 for log file storage and delivery, so log files are stored durably. In addition to capturing CloudTrail logs within a specified S3 bucket for long term analysis, realtime analysis can be performed by configuring CloudTrail to send logs to CloudWatch Logs. It is recommended that CloudTrail logs be sent to CloudWatch Logs.

Type: [Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark]

Compliance Status: FAILED

Product Name: N/A

Company Name: N/A

Generator Id: arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule/2.4

Record State: ACTIVE

Workflow Status: NEW

Workflow State: NEW

Account Id: 012345678912

Region: N/A

Source URL: N/A

Resource: [ { "Type" : "AwsAccount", "Id" : "AWS::::Account:012345678912", "Partition" : "aws", "Region" : "us-east-1" } ]

Mitigation: For directions on how to fix this issue, please consult the AWS Security Hub CIS documentation. https://docs.aws.amazon.com/console/securityhub/standards-cis-2.4/remediation

Finding Id : 30280444

armorcodegithubpreprod[bot] commented 11 months ago

Finding [30280444|https://preprod.armorcode.ai/#/findings/209/990/30280444] status changed to Open Note: null by SYSTEM via ArmorCode Platform