More Info:

All your AWS CloudTrail trails should be configured to log Management events in order to record important operations such as EC2 RunInstances, DescribeInstances, TerminateInstances and Console Login.

Risk Level

Medium

Address

Security

Compliance Standards

SOC2, NIST, GDPR, HIPAA, ISO27001, AWSWAF

Triage and Remediation

Remediation

Sure, here are the step-by-step instructions to remediate the “CloudTrails Must Log Management Events” misconfiguration for AWS:

  1. Open the AWS Management Console and navigate to the CloudTrail service.

  2. Click on the Trails option in the left-hand menu.

  3. Select the trail that you want to modify and click on the Edit button.

  4. Scroll down to the Management events section.

  5. Enable the Log management events toggle switch.

  6. Choose the S3 bucket where you want to store the logs.

  7. Select the SNS topic (optional) to receive notifications.

  8. Click on the Save button to save the changes.

Once you complete these steps, CloudTrail will start logging management events to the specified S3 bucket. This will help you to monitor and track all the changes made to your AWS account, including changes made to IAM users, roles, policies, security groups, and more.

Additional Reading: