More Info:

Any S3 buckets used by AWS CloudTrail should have Server Access Logging feature enabled in order to track requests for accessing the buckets and necessary for security audits.

Risk Level

Medium

Address

Security

Compliance Standards

HIPAA, GDPR, SOC2, CISAWS, CBP, AWSWAF

Triage and Remediation

Remediation

To remediate the misconfiguration “Server Access Logging Feature Should Be Enabled” for AWS using the AWS console, follow these steps:

  1. Login to the AWS Management Console.
  2. Navigate to the S3 service.
  3. Select the S3 bucket for which you want to enable server access logging.
  4. Click on the “Properties” tab.
  5. Scroll down to the “Server access logging” section and click on “Edit”.
  6. Select the checkbox “Enable logging”.
  7. Choose the target bucket and target prefix for the log files.
  8. Click on “Save changes”.

Once you have enabled the server access logging feature, all access requests made to the S3 bucket will be logged and stored in the target bucket you have specified. This will help you track and monitor all access to your S3 bucket, which can help you identify any potential security threats or unauthorized access attempts.

Additional Reading: