CCSS (Common Configuration Scoring System) is a set of measures used to determine the severity of the rule.
Each rule is associated with a high-level category. For example IAM, Container, Monitoring, Logging, Network, etc.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsBucket access logging tracks access requests to the S3 bucket storing CloudTrail log data and can be useful in security and incident response workflows.
Configure the aws_s3_bucket
logging
block to specify a target_bucket
to receive access log objects.
For detailed instructions, see below:
logging
block that specifies a target_bucket that will receive the log objects, and optionally, a target_prefix.resource "aws_s3_bucket" "cloudtrail_bucket" {
bucket = "cloudtrail-bucket"
logging {
target_bucket = "${aws_s3_bucket.log_bucket.id}"
target_prefix = "log/"
}
# other required fields here
}
Configure the AWS::CloudTrail::Trail
LoggingConfiguration
block to specify a DestinationBucketName
to receive access log objects.
For detailed instructions, see below:
LoggingConfiguration
block that specifies a DestinationBucketName that will receive the log objects, and optionally, a LogFilePrefix.JSON example configuration:
{
"Type": "AWS::S3::Bucket",
"Properties": {
"LoggingConfiguration": {
"DestinationBucketName": {
"Ref": "LoggingBucket"
},
"LogFilePrefix": "testing-logs"
}
}
# other required fields here
}
YAML example configuration:
Type: AWS::S3::Bucket
Properties:
LoggingConfiguration:
DestinationBucketName: !Ref LoggingBucket
LogFilePrefix: testing-logs
# other required fields here