RDS instances should publish logs to CloudWatch Logs

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Description

This control verifies whether an Amazon RDS DB instance is configured to publish specific logs to Amazon CloudWatch Logs. The control fails if the instance is not configured to publish the following logs to CloudWatch Logs:

  • Oracle: Alert, Audit, Trace, Listener
  • PostgreSQL: Postgresql, Upgrade
  • MySQL: Audit, Error, General, SlowQuery
  • MariaDB: Audit, Error, General, SlowQuery
  • SQL Server: Error, Agent
  • Aurora: Audit, Error, General, SlowQuery
  • Aurora-MySQL: Audit, Error, General, SlowQuery
  • Aurora-PostgreSQL: Postgresql, Upgrade

It is recommended for RDS databases to have relevant logging enabled. Database logs offer detailed records of requests made to RDS, which can be invaluable for security and access audits, as well as troubleshooting availability issues.

Remediation

To configure your RDS database to publish logs to CloudWatch Logs, refer to the Specifying the logs to publish to CloudWatch Logs section in the Amazon RDS User Guide.

PREVIEWING: dgreen15/github-error-fix