CIS AWS Foundations v1.2 2.1: CloudTrail should be enabled and configured with at least one multi-Region trail that includes read and write management events
To meet CIS AWS Foundations v1.2 2.1, you must enable AWS CloudTrail and configure at least one multi-Region trail that records both read and write management events across the account, then route logs to durable storage where you can prove continuous operation. Operationally, this means an organization-level trail, centralized logging, and ongoing verification.
Key takeaways:
- You need one multi-Region CloudTrail capturing read + write management events (AWS Security Hub control: CloudTrail.1) 1.
- Build for auditability: central S3 bucket + log integrity + monitoring, plus evidence you can produce on demand 2.
- Treat this as a fleet control: enforce via AWS Organizations + IaC/SCPs, not manual console configuration 2.
This requirement is a baseline logging control: without CloudTrail management event coverage, you cannot reliably reconstruct who changed IAM policies, created access keys, modified security groups, disabled encryption, or altered logging itself. CIS AWS Foundations v1.2 2.1 specifically expects a CloudTrail configuration that can’t be bypassed by “only some regions” gaps and that captures both read-only lookups and write actions for management-plane activity 2.
For a Compliance Officer, CCO, or GRC lead, the fastest path is to frame this as an account-level (ideally organization-level) control with three parts: (1) correct CloudTrail scope (multi-Region, management events read + write), (2) durable centralized retention with integrity signals, and (3) a repeatable check that proves the setting stayed in place over time. AWS Security Hub already maps this requirement to CloudTrail.1, which you can use as a continuous control signal and as audit evidence 1.
This page tells you exactly what to configure, how to verify it, and what evidence to retain so audits don’t stall on avoidable logging questions.
Regulatory text
Requirement summary (operator view): Implement CIS AWS Foundations Benchmark v1.2 requirement 2.1 as mapped in AWS Security Hub 3.
What the operator must do:
Configure AWS CloudTrail so that at least one trail is multi-Region and captures management events for both read and write actions across the account 3. In practice, auditors expect this to be:
- Enabled in all in-scope AWS accounts (prod, staging, shared services, security/log archive).
- Configured so it can’t be quietly disabled or scoped down without detection.
- Producing logs you can retrieve and correlate during incident response and compliance testing.
Plain-English interpretation
You must record the AWS control-plane activity that explains “who did what” in your account, in every region where activity could occur. A multi-Region trail prevents blind spots created by region expansion or forgotten opt-in regions. Including both read and write management events prevents a second blind spot: “read-only” API calls (like Describe*, Get*, List*) are often the first step in reconnaissance and can matter during investigations.
This requirement is about management events, not data events (like S3 object-level access) and not CloudTrail Insights. You can add those later, but you do not meet 2.1 if management events aren’t captured as specified.
Who it applies to
Entity types: AWS cloud operators and any organization running workloads in AWS accounts that fall under your compliance boundary 2.
Operational contexts where it matters most:
- Regulated production environments (financial services, healthcare, critical infrastructure) where you must explain administrative changes.
- Multi-account AWS Organizations where consistency and drift control matter more than one-off configurations.
- High-change environments with IaC-driven deployments, frequent IAM changes, or multiple admin teams.
If you have third parties administering parts of your AWS environment (MSP, SOC, DevOps contractor), this control still applies. You own the evidence and the ability to prove CloudTrail coverage.
What you actually need to do (step-by-step)
Step 1: Pick your operating model (single account vs. organization)
Preferred (most defensible): Create an AWS Organizations organization trail that applies to all accounts, then send logs to a central logging account. This reduces control drift and simplifies evidence collection.
Acceptable (higher risk of drift): Configure one multi-Region trail per account.
Document your choice and the rationale in your logging standard, then implement consistently.
Step 2: Create or confirm a multi-Region CloudTrail that captures management events
Minimum configuration elements that map cleanly to CIS 2.1 expectations:
- Multi-Region trail = Enabled.
- Management events = Enabled for both Read and Write.
- Applies broadly to the account (not restricted to a narrow subset of regions).
- Trail is actively logging.
Practical tips for operators:
- Use a clear naming convention (example:
org-management-trail). - Ensure the trail covers the accounts that host security services (GuardDuty, Security Hub, IAM Identity Center), not just workload accounts.
Step 3: Centralize storage and lock it down (so evidence survives)
While CIS 2.1 is about enabling/configuring CloudTrail, audits quickly move to “prove the logs are retained and tamper-resistant.” Set up:
- Central S3 bucket in a designated logging account.
- Tight S3 bucket policy to allow CloudTrail writes and prevent deletion by non-security admins.
- Separation of duties: the team that administers workloads should not be able to delete or overwrite logs without going through change control.
If you already use a SIEM, forward CloudTrail logs there, but keep S3 as the system of record for retention and replay.
Step 4: Add integrity and operational monitoring (so the control stays true)
Auditors rarely accept “we configured it once.” Put guardrails in place:
- Log file validation (CloudTrail feature) where operationally feasible.
- Alerting on CloudTrail being stopped, deleted, or modified.
- Security Hub enabled with CIS mapping so CloudTrail.1 stays visible as a continuous check 1.
Step 5: Prove it continuously (verification routine)
Build a lightweight, repeatable verification that you can run on demand:
- Confirm at least one trail has
IsMultiRegionTrail=true. - Confirm
IncludeManagementEvents=trueand that both read and write events are recorded. - Confirm the trail is logging and delivering objects to the central bucket.
This can be done via AWS CLI, Config, Security Hub findings, or your GRC evidence collector. Daydream typically fits here as the workflow layer: map CloudTrail.1 to your control, schedule evidence pulls, and keep a clean audit trail of “checked, by whom, when, and what the result was.”
Required evidence and artifacts to retain
Store evidence in a way that supports both point-in-time and period-of-time questions.
Configuration evidence (design):
- Screenshot or exported config showing:
- Trail name, multi-Region enabled, management events set to read + write.
- Destination S3 bucket (and KMS key if used).
- CloudTrail event selectors showing management events configuration.
- Security Hub control status for CloudTrail.1 (pass/fail history) 1.
Operational evidence (effectiveness):
- Sample CloudTrail log files from at least two regions (or proof that the trail is multi-Region and capturing events across regions).
- Change tickets / approvals for trail modifications.
- Alert records or SIEM detections for “CloudTrail configuration change” tests (tabletop or controlled change).
Policy/process artifacts (governance):
- Logging standard stating CloudTrail must be multi-Region and capture read/write management events 2.
- Role/ownership matrix: who administers CloudTrail, who owns the log archive, who reviews alerts.
Common exam/audit questions and hangups
1) “Show me it’s multi-Region.”
Have the trail configuration export ready and label the relevant field.
2) “Does it include read events, or only write?”
Many environments log only write to reduce noise. CIS 2.1 expects both. Be ready to show the event selector configuration.
3) “What about accounts created last month?”
If you rely on per-account trails, new accounts are a common gap. Organization trails reduce this risk.
4) “Can admins delete the logs?”
Even though not strictly the wording of 2.1, this is a standard follow-up. Show bucket policies, retention controls, and separation of duties.
5) “How do you know CloudTrail wasn’t turned off for a week?”
Have monitoring/alerting plus Security Hub historical posture available 1.
Frequent implementation mistakes and how to avoid them
| Mistake | Why it fails audits | How to avoid |
|---|---|---|
| Single-region trail | Leaves unlogged activity in other regions | Require multi-Region trails in your standard and enforce via Organizations 2. |
| Only write management events | Misses read-only reconnaissance and investigation context | Explicitly enable read + write management events; verify via event selectors. |
| Trail exists but not logging | “Configured” isn’t “operating” | Monitor for StopLogging / trail deletion; review Security Hub CloudTrail.1 regularly 1. |
| Logs stored in the same account with broad admin permissions | Log tampering risk; weak evidence integrity | Centralize in a log archive account with restrictive bucket policies. |
| Manual console setup | Drift across accounts and time | Use IaC and org-level controls; keep a standard change workflow. |
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite specific penalties or settlements.
Operationally, the risk is straightforward: without complete management-plane audit logs across regions, you will struggle to (a) investigate suspected compromise, (b) prove administrative accountability, and (c) demonstrate control operation to auditors. In many incident narratives, missing logs become a secondary failure because they prevent scoping and containment decisions. Treat CIS 2.1 as foundational detective control coverage 2.
Practical 30/60/90-day execution plan
First 30 days (get to baseline compliance)
- Inventory in-scope AWS accounts and identify current CloudTrail posture (use Security Hub CloudTrail.1 where enabled) 1.
- Decide and document operating model: org trail vs per-account.
- Implement at least one multi-Region trail per in-scope boundary that logs read + write management events.
- Stand up centralized S3 log archive permissions and ownership model.
Days 31–60 (make it durable and auditable)
- Add monitoring and alerting for trail changes and logging stoppage.
- Formalize evidence collection:
- Monthly export of trail configuration.
- Security Hub CloudTrail.1 status snapshots or automated evidence pulls 1.
- Update policies/standards and train platform owners on “what breaks compliance” (turning off read events, creating single-region trails, disabling logging).
Days 61–90 (scale and reduce drift)
- Convert remaining accounts to organization-level coverage if feasible.
- Add preventive controls:
- SCP guardrails or Config rules to prevent disabling CloudTrail (implementation method is your choice; keep it consistent).
- Run an internal audit dry run:
- Produce configuration evidence + sample logs + monitoring proof in one package.
- Consider Daydream to keep the control mapped, evidence collected, and exceptions time-bound (for example, temporary carve-outs for sandbox accounts with explicit approval).
Frequently Asked Questions
Do I need more than one trail to satisfy CIS AWS Foundations v1.2 2.1?
The requirement is satisfied with at least one multi-Region trail that includes read and write management events 2. You may still choose multiple trails for different destinations or teams, but at least one must meet the stated scope.
Does this require logging data events (like S3 object-level access)?
No. CIS 2.1 focuses on management events (read and write) 2. Data events can be a separate requirement or an internal enhancement if your threat model calls for it.
Can I rely on AWS Security Hub to prove compliance?
Security Hub’s CloudTrail.1 control is a strong continuous signal and maps directly to this CIS requirement 1. Auditors often still ask for trail configuration exports and example logs, so keep both.
What’s the fastest way to prevent new AWS accounts from missing CloudTrail?
Use an AWS Organizations approach (organization trail plus centralized logging) so new accounts inherit coverage by default. If you can’t do that immediately, add account-vending steps that create the required multi-Region trail at provisioning time.
If I have a multi-Region trail, do I still need to worry about new regions?
Multi-Region reduces this risk substantially because it records management events across regions for supported services. Keep a periodic verification step so you can show continuous operation, not a one-time setup.
How should I handle exceptions (sandbox, research, acquired environments)?
Document the exception with scope, owner, compensating controls (for example, restricted admin access), and an expiration date. Keep Security Hub CloudTrail.1 findings or other evidence tied to the exception record 1.
Related compliance topics
- 03.01.18: Access Control for Mobile Devices
- 03.01.19: Withdrawn
- 03.01.20: Use of External Systems
- 03.01.21: Withdrawn
- 03.01.22: Publicly Accessible Content
Footnotes
Frequently Asked Questions
Do I need more than one trail to satisfy CIS AWS Foundations v1.2 2.1?
The requirement is satisfied with **at least one** multi-Region trail that includes read and write management events (Source: CIS AWS Foundations Benchmark). You may still choose multiple trails for different destinations or teams, but at least one must meet the stated scope.
Does this require logging data events (like S3 object-level access)?
No. CIS 2.1 focuses on **management events** (read and write) (Source: CIS AWS Foundations Benchmark). Data events can be a separate requirement or an internal enhancement if your threat model calls for it.
Can I rely on AWS Security Hub to prove compliance?
Security Hub’s **CloudTrail.1** control is a strong continuous signal and maps directly to this CIS requirement (Source: AWS Security Hub CIS AWS Foundations mapping table). Auditors often still ask for trail configuration exports and example logs, so keep both.
What’s the fastest way to prevent new AWS accounts from missing CloudTrail?
Use an AWS Organizations approach (organization trail plus centralized logging) so new accounts inherit coverage by default. If you can’t do that immediately, add account-vending steps that create the required multi-Region trail at provisioning time.
If I have a multi-Region trail, do I still need to worry about new regions?
Multi-Region reduces this risk substantially because it records management events across regions for supported services. Keep a periodic verification step so you can show continuous operation, not a one-time setup.
How should I handle exceptions (sandbox, research, acquired environments)?
Document the exception with scope, owner, compensating controls (for example, restricted admin access), and an expiration date. Keep Security Hub CloudTrail.1 findings or other evidence tied to the exception record (Source: AWS Security Hub CIS AWS Foundations mapping table).
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream