TF 0125 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Cloudtrail should be enabled in all regions regardless of where your AWS resources are generally homed

Property Value
Language terraform
Severity medium
Service cloudtrail
Provider AWS
Vulnerability Type omission

Description

The CloudTrail configuration only logs activity in selected regions, leaving other regions unmonitored. This partial logging occurs because the 'is_multi_region_trail' setting is not enabled in Terraform, unlike the default in the AWS Console.

Impact

Malicious or unauthorized activity in unmonitored AWS regions could go undetected, allowing attackers to perform actions without audit trails. This weakens incident detection and response, increasing the risk of unnoticed breaches or compliance failures.

Resolution

Enable Cloudtrail in all regions