We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ensure CloudTrail Logs are encrypted before deploying to production.
Required KMS key policy elements for trails
Enable CloudTrail log encrypt permissions. See Granting encrypt permissions. Enable CloudTrail log decrypt permissions. See Granting decrypt permissions. If you are using an existing S3 bucket with an S3 Bucket Key, kms:Decrypt permissions are required to create or update a trail with SSE-KMS encryption enabled. Enable CloudTrail to describe KMS key properties. See Enable CloudTrail to describe KMS key properties.
The text was updated successfully, but these errors were encountered:
Matthew-Grayson
Successfully merging a pull request may close this issue.
💡 Summary
Ensure CloudTrail Logs are encrypted before deploying to production.
Required KMS key policy elements for trails
Enable CloudTrail log encrypt permissions. See Granting encrypt permissions.
Enable CloudTrail log decrypt permissions. See Granting decrypt permissions. If you are using an existing S3 bucket with an S3 Bucket Key, kms:Decrypt permissions are required to create or update a trail with SSE-KMS encryption enabled.
Enable CloudTrail to describe KMS key properties. See Enable CloudTrail to describe KMS key properties.
The text was updated successfully, but these errors were encountered: