More Info:

Audit logging should be enabled for Redshift clusters for security and troubleshooting purposes.

Risk Level

Medium

Address

Security

Compliance Standards

HIPAA, NIST, SOC2, NISTCSF, PCIDSS

Triage and Remediation

Remediation

To remediate the misconfiguration of Redshift Cluster Audit logging not being enabled in AWS using the AWS Management Console, follow these step-by-step instructions:

  1. Login to AWS Console: Go to the AWS Management Console (https://aws.amazon.com/console/) and log in with your credentials.

  2. Navigate to Amazon Redshift: Click on the “Services” dropdown menu at the top left corner of the console, then select “Redshift” under the Analytics section.

  3. Select the Redshift Cluster: In the Redshift dashboard, click on the Redshift cluster for which you want to enable audit logging.

  4. Modify Cluster: In the cluster details page, click on the “Cluster” dropdown menu at the top, then select “Modify Cluster”.

  5. Enable Audit Logging: Scroll down to the “Audit logging” section in the Modify Cluster settings.

  6. Enable Audit Logging: Check the box next to “Enable audit logging”.

  7. Choose S3 Bucket: Select an existing S3 bucket where you want to store the audit logs or create a new one.

  8. IAM Role: Choose an existing IAM role that has permission to write logs to the selected S3 bucket, or create a new IAM role with the required permissions.

  9. Encryption: Choose whether you want to encrypt the audit logs using AWS Key Management Service (KMS). If you choose to encrypt, select the KMS key to use.

  10. Save Changes: Scroll to the bottom of the page and click on the “Modify Cluster” button to save the changes.

  11. Monitor Audit Logs: Once the changes are saved, Redshift will start logging audit information to the specified S3 bucket. You can monitor the audit logs in the S3 bucket to ensure that the logging is working correctly.

By following these steps, you have successfully enabled audit logging for your AWS Redshift cluster, remedying the misconfiguration of audit logging not being enabled.

Additional Reading: