CCSS (Common Configuration Scoring System) is a set of measures used to determine the severity of the rule.
Each rule is associated with a high-level category. For example IAM, Container, Monitoring, Logging, Network, etc.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsBucket access logging tracks access requests to the S3 bucket storing CloudTrail log data and can be useful in security and incident response workflows.
Configure the aws_s3_bucket logging block to specify a target_bucket to receive access log objects.
For detailed instructions, see below:
logging block that specifies a target_bucket that will receive the log objects, and optionally, a target_prefix.Example configuration:
resource "aws_s3_bucket" "cloudtrail_bucket" {
bucket = "cloudtrail-bucket"
logging {
target_bucket = "${aws_s3_bucket.log_bucket.id}"
target_prefix = "log/"
}
# other required fields here
}
Configure the AWS::CloudTrail::Trail LoggingConfiguration block to specify a DestinationBucketName to receive access log objects.
For detailed instructions, see below:
LoggingConfiguration block that specifies a DestinationBucketName that will receive the log objects, and optionally, a LogFilePrefix.Example configuration:
JSON example configuration:
{
"Type": "AWS::S3::Bucket",
"Properties": {
"LoggingConfiguration": {
"DestinationBucketName": {
"Ref": "LoggingBucket"
},
"LogFilePrefix": "testing-logs"
}
}
# other required fields here
}
YAML example configuration:
Type: AWS::S3::Bucket
Properties:
LoggingConfiguration:
DestinationBucketName: !Ref LoggingBucket
LogFilePrefix: testing-logs
# other required fields here