Cloudanix home pagelight logodark logo
  • Community
  • Login
  1. AWS Audit
  2. CloudTrail Audit
  • Overview
  • AWS
  • Azure
  • GCP
  • GitHub
  • AWS Introduction
    • Security of your AWS Account
  • AWS Audit
    • Getting Started with AWS Audit
    • Permissions required for Audit recipe
    • Ad-hoc running an Audit
    • API Gateway Audit
    • Cloudformation Audit
    • CloudFront Audit
    • CloudTrail Audit
    • Cloudwatch Audit
    • DynamoDB Audit
    • EC2 Audit
    • Elastic Search Audit
    • ELB Audit
    • IAM Audit
    • KMS Audit
    • Kubernetes Audit
    • Lambda Audit
    • RDS Audit
    • Redshift Audit
    • Route53 Audit
    • S3 Audit
    • Security Groups Audit
    • SES Audit
    • SNS Audit
  • Resources
    • AWS Services which determine your cost

AWS Audit

Edit this page
Raise an issue

CloudTrail Audit

​
Checks performed

  • CloudTrail Logging Bucket Should Use MFA Delete Feature
  • CloudTrail Logging Buckets Should Not Be Publicly Accessible
  • CloudTrail Must Log Data Events
  • Log files Should Be Delivered Without Any Failures
  • CloudTrail Must Be Enabled For All Regions
  • Trails Should Record Both Regional And Global Events
  • Duplicate Entries Should Be Avoided In CloudTrail Logs
  • CloudTrail Events Should Be Monitored By CloudWatch Logs
  • File Integrity Validation Feature Should Be Enabled For Trails
  • CloudTrail Logs Should Be Encrypted
  • CloudTrails Must Log Management Events
  • CloudTrail Should Be Configured To Use Appropriated S3 Bucket
  • Server Access Logging Feature Should Be Enabled
  • Object Lock Feature Should Be Enabled
CloudFront AuditCloudwatch Audit
Powered by Mintlify
githubtwitter
  • Checks performed