Lockdown Lab #26 CRITICAL AWS

Enable CloudTrail in all regions

Enable CloudTrail in all regions

Let’s talk about the first thing sophisticated attackers go after: your audit trail. If they can blind you, they own you. CloudTrail is that trail in AWS, and most organizations are still leaving massive gaps.

The problem is simple: many only enable CloudTrail in their primary region. Attackers know this. They’ll spin up resources in an unmonitored region – think crypto mining, data staging, or a new C2 server – and you’ll never see it happen. It’s a fundamental blind spot.

You need CloudTrail logging API calls in all regions, not just the ones you think you’re using. Crucially, enable log file validation. This prevents attackers from tampering with the logs themselves, which is their next move after disabling the trail.

The fix isn’t complicated. Configure a multi-region trail via the AWS Console or CloudFormation. Ensure it’s configured for all regions, and log file validation is enabled. This is a non-negotiable baseline.

Stop leaving your back door open. Enable CloudTrail everywhere.

The fix

# Check CloudTrail status\naws cloudtrail describe-trails --query 'trailList[].{Name:Name,Multi:IsMultiRegionTrail,Logging:HasCustomEventSelectors}'\n# Create multi-region trail\naws cloudtrail\

Reference: CIS AWS Foundations Benchmark 3.1

Mark this as done

Open the interactive hardening checklist and tick this off in your environment.

Open interactive checklist →

Related Posts

Remove 0.0.0.0/0 from security groups

The Capital One breach in 2019? A misconfigured security group allowing SSRF to the metadata service. This isn't theoretical; unrestricted inbound access is a primary...

lockdown-labhardeningawsnetwork
/Shimi Cohen

Enforce least privilege IAM policies

You know what gets me? Seeing environments where a single compromised credential can bring down a whole AWS account. Nine times out of ten, it’s...

lockdown-labhardeningawsidentity
/Shimi Cohen

Enforce MFA for IAM users

A compromised AWS console is a full-blown incident. You're looking at data exfiltration, service disruption, and massive reputational damage. And it almost always starts with...

lockdown-labhardeningawsidentity
/Shimi Cohen