Using SSE-S3 with CloudTrail? #6320
-
QuestionAVD-AWS-0015 suggests that "Cloudtrail should be encrypted at rest to secure access to sensitive trail data", and cites the AWS CloudTrail documentation for SSE-KMS. According to that page:
To my ears, it sounds like I can use either SSE-S3 or SSE-KMS to achieve encryption-at-rest of CloudTrail data. However, if I omit the
Now, I can definitely set up and manage an SSE-KMS key, but I'm wondering whether the AVD-AWS-0015 recommendation dates from before the rollout of SSE-S3 encryption for CloudTrail. TargetAWS ScannerMisconfiguration Output FormatTable ModeStandalone Operating SystemGitHub Actions Version |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
You're right, the check predates the new AWS update and we should update the check accordingly. I'll create an issue from this discussion to track it. |
Beta Was this translation helpful? Give feedback.
You're right, the check predates the new AWS update and we should update the check accordingly. I'll create an issue from this discussion to track it.