Json Yaml Is Multi Region False
Description
Detects CloudTrail trails in CloudFormation templates that are not configured for multi-region logging. This is a security risk as it may leave AWS API activity in other regions unmonitored, potentially missing unauthorized actions or security incidents.
Detection Strategy
• Scan CloudFormation template files for AWS::CloudTrail::Trail resource definitions
• Check if the IsMultiRegionTrail property is explicitly set to false or is missing
• Report a vulnerability if the trail is not configured to monitor multiple regions
Vulnerable code example
Resources:
myTrail:
Type: AWS::CloudTrail::Trail
Properties:
IsLogging: true
EnableLogFileValidation: false # Vulnerable: Log file validation is disabled, allowing potential tampering
IsMultiRegionTrail: false # Vulnerable: Trail only monitors single region✅ Secure code example
Resources:
myTrail:
Type: AWS::CloudTrail::Trail
Properties:
IsLogging: true
EnableLogFileValidation: true # Enable log validation to prevent tampering
IsMultiRegionTrail: true # Enable multi-region for comprehensive monitoringSearch for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.