Skip to main content

Table for CloudTrail Trails Not Encrypted with Customer KMS

This table provides an overview of important information regarding CloudTrail trails that are not encrypted with a customer-managed KMS key. It is intended for IT and Security Engineers responsible for ensuring compliance and security in cloud environments.

AspectDetails
IssueCloudTrail trails are not encrypted using a Customer Managed Key (CMK) from AWS KMS.
ImpactPotential exposure of sensitive audit logs to unauthorized access or tampering.
Recommended ActionEnable encryption for CloudTrail logs using a CMK to enhance security and access control.
Steps to Remediate1. Identify CloudTrail trails without CMK encryption.
2. Update the trail configuration to use a CMK for encryption.
3. Ensure IAM policies allow CloudTrail to access the CMK.
VerificationUse the AWS Management Console, CLI, or SDK to verify CMK encryption status of trails.
ToolsAWS Management Console, AWS CLI, AWS Config, Security Hub, or third-party compliance tools.
Compliance StandardsEnsures adherence to compliance frameworks such as PCI DSS, HIPAA, and SOC 2.
AWS Best PracticesEncrypt CloudTrail logs with a CMK to meet AWS security best practices.
Audit Commandsaws cloudtrail describe-trails --query 'trailList[*].KmsKeyID'
Log VerificationCheck S3 bucket policies and KMS key usage in AWS CloudTrail event history.
AlertingConfigure AWS Config Rules or Security Hub findings to monitor non-compliant trails.