2.6 Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket
Created by: armorcodegithubapp[bot]
S3 Bucket Access Logging generates a log that contains access records for each request made to your S3 bucket. An access log record contains details about the request, such as the request type, the resources specified in the request worked, and the time and date the request was processed. It is recommended that bucket access logging be enabled on the CloudTrail S3 bucket.
Type: [Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark]
Compliance Status: FAILED
Product Name: N/A
Company Name: N/A
Generator Id: arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule/2.6
Record State: ACTIVE
Workflow Status: NEW
Workflow State: NEW
Account Id: 012345678912
Region: N/A
Source URL: N/A
Resource: [ { "Type" : "AwsS3Bucket", "Id" : "arn:aws:s3:::616c-net-aws-dev-cdm-audit-logs-cloudtrail", "Partition" : "aws", "Region" : "us-east-1" } ]
Created At: Mon Jun 08 14:19:53 UTC 2020
Updated At: Sun Jun 14 20:15:38 UTC 2020
Mitigation: For directions on how to fix this issue, please consult the AWS Security Hub CIS documentation. https://docs.aws.amazon.com/console/securityhub/standards-cis-2.6/remediation
Finding Id : 88311851