RDS instances should publish logs to CloudWatch Logs

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Description

This control verifies whether an Amazon RDS DB instance is configured to publish specific logs to Amazon CloudWatch Logs. The control fails if the instance is not configured to publish the following logs to CloudWatch Logs:

  • Oracle: Alert, Audit, Trace, Listener
  • PostgreSQL: Postgresql, Upgrade
  • MySQL: Audit, Error, General, SlowQuery
  • MariaDB: Audit, Error, General, SlowQuery
  • SQL Server: Error, Agent
  • Aurora: Audit, Error, General, SlowQuery
  • Aurora-MySQL: Audit, Error, General, SlowQuery
  • Aurora-PostgreSQL: Postgresql, Upgrade

It is recommended for RDS databases to have relevant logging enabled. Database logs offer detailed records of requests made to RDS, which can be invaluable for security and access audits, as well as troubleshooting availability issues.

Remediation

To configure your RDS database to publish logs to CloudWatch Logs, refer to the Specifying the logs to publish to CloudWatch Logs section in the Amazon RDS User Guide.

PREVIEWING: esther/docs-9518-update-example-control-sensitive-log-data