Skip to main content

Table for Unconfigured Data Events Logging in CloudTrail Trails

CategoryDetails
DefinitionData events capture object-level API activity (e.g., S3 object access, Lambda function invocation).
Unconfigured LoggingWhen data events logging is not enabled, CloudTrail does not log these activities.
RisksLack of visibility into data access, potential undetected unauthorized or malicious activities.
Impacted ServicesAWS S3, AWS Lambda, DynamoDB, and other services with object-level APIs.
Key IndicatorsAbsence of specific logs for actions like GetObject, PutObject, or InvokeFunction.
Mitigation StepsEnable data events logging in CloudTrail for the relevant trails.
Configuration Steps1. Open CloudTrail console. 2. Select a trail. 3. Enable data events for the target resources.
Best Practices1. Regularly review and enable data events for sensitive resources. 2. Use IAM policies to restrict access to critical resources.
ComplianceEssential for meeting compliance standards like PCI DSS, HIPAA, or SOC 2.
Additional ToolsAWS Config, Security Hub, or third-party monitoring tools for visibility and alerts.