logo

Database

Json Yaml User Activity Logging Disabled

Description

Detects AWS Redshift clusters with disabled user activity logging in CloudFormation templates. When user activity logging is disabled, it reduces audit capabilities and visibility into user actions within the Redshift cluster, potentially impacting security monitoring and compliance requirements.

Weakness:

400 - Traceability Loss - AWS

Category: Functionality Abuse

Detection Strategy

    Identifies CloudFormation resources with type 'AWS::Redshift::ClusterParameterGroup'

    Examines the parameter group configuration to check if user activity logging parameters are disabled

    Reports a vulnerability if the parameter group explicitly disables or fails to enable user activity logging

Vulnerable code example

Resources:
  UnsafeRedshiftPG:
    Type: 'AWS::Redshift::ClusterParameterGroup'
    Properties:
      Description: "Unsafe parameter group"
      ParameterGroupFamily: "redshift-1.0"
      Parameters:
        - ParameterName: "enable_user_activity_logging"  # Vulnerable: Explicitly disables security logging...

✅ Secure code example

Resources:
  SafeRedshiftPG:
    Type: 'AWS::Redshift::ClusterParameterGroup'
    Properties:
      Description: "Secure parameter group with logging and WLM controls"
      ParameterGroupFamily: "redshift-1.0"
      Parameters:
        - ParameterName: "enable_user_activity_logging"  # Enable audit logging for security tracking...