enable-all-regions
Explanation
When creating Cloudtrail in the AWS Management Console the trail is configured by default to be multi-region, this isn't the case with the Terraform resource. Cloudtrail should cover the full AWS account to ensure you can track changes in regions you are not actively operting in.
Possible Impact
Activity could be happening in your account in a different region
Suggested Resolution
Enable Cloudtrail in all regions
Insecure Example
The following example will fail the AVD-AWS-0014 check.
---
Resources:
BadExample:
Type: AWS::CloudTrail::Trail
Properties:
IsLogging: true
IsMultiRegionTrail: false
S3BucketName: "CloudtrailBucket"
S3KeyPrefix: "/trailing"
TrailName: "Cloudtrail"
Secure Example
The following example will pass the AVD-AWS-0014 check.
---
Resources:
BadExample:
Type: AWS::CloudTrail::Trail
Properties:
IsLogging: true
IsMultiRegionTrail: true
S3BucketName: "CloudtrailBucket"
S3KeyPrefix: "/trailing"
TrailName: "Cloudtrail"