High

Ensure CloudTrail buckets are configured to use MFA

Security & Compliance
Description

To prevent the accidental or intentional deletion of versioned log files in your Amazon CloudTrail buckets, it is important to configure them to use the Multi-Factor Authentication (MFA) Delete feature. Enabling MFA-protected bucket for your Amazon CloudTrail trail adds an important layer of protection to ensure that your versioned log files cannot be deleted in case your access credentials are compromised. It ensures that any DELETE actions for the CloudTrail bucket can only be performed by the S3 bucket owner who has access to the MFA device. It's important to note that only the S3 bucket owner can enable the MFA Delete feature and perform DELETE actions for the CloudTrail bucket. By enabling this feature, you can add an extra layer of security to protect your CloudTrail log files from accidental or intentional deletion.

Remediation

To ensure that CloudTrail buckets are configured to use Multi-Factor Authentication (MFA), you can follow these remediation steps:

  1. Enable versioning for your CloudTrail buckets:Before enabling MFA Delete, you need to enable versioning for your CloudTrail buckets. Versioning enables you to retain multiple versions of an object in the same bucket.
  2. Enable MFA Delete:To enable MFA Delete, you must be the owner of the S3 bucket. Once you have enabled versioning, you can enable MFA Delete by using the S3 console, AWS CLI, or AWS SDKs.
  3. Grant access to MFA-protected buckets:You should grant access to MFA-protected buckets only to trusted users who have a legitimate need to access the data. You can use AWS Identity and Access Management (IAM) policies to grant access to specific users or groups.
  4. Monitor MFA-protected bucket access:You should monitor MFA-protected bucket access to detect any unauthorized access attempts. You can use S3 bucket access logs and CloudTrail logs to identify any potential security issues.
  5. Train users on MFA best practices:You should train users on MFA best practices to ensure that they understand the importance of using MFA to protect their AWS accounts and CloudTrail buckets. Users should be reminded to keep their MFA devices secure and to report any suspicious activity immediately.
Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.