Skip to main content
← All controls
AU-2 / AU-3 / AU-6 / AU-9 / AU-12 NIST SP 800-53 Rev 5

Are control-plane logs (CloudTrail, Activity Log, Audit Log) enabled, centralised, and monitored?

Demonstrate that control-plane audit logs are enabled comprehensively across all cloud subscriptions/accounts and regions, aggregated into a centralized repository with integrity protections, and actively monitored for security-relevant events.

Description

What this control does

Control-plane logs (AWS CloudTrail, Azure Activity Log, GCP Cloud Audit Logs) record API calls, administrative actions, and configuration changes across cloud infrastructure. Enabling these logs across all regions and accounts, centralizing them in a tamper-resistant storage location (such as a dedicated logging account or SIEM), and establishing automated monitoring ensures visibility into potentially malicious or erroneous privileged operations. This control is foundational for incident response, forensic investigation, compliance validation, and detection of lateral movement or privilege escalation in cloud environments.

Control objective

What auditing this proves

Demonstrate that control-plane audit logs are enabled comprehensively across all cloud subscriptions/accounts and regions, aggregated into a centralized repository with integrity protections, and actively monitored for security-relevant events.

Associated risks

Risks this control addresses

  • Unauthorized API calls or privilege escalation attempts go undetected due to missing or incomplete audit logs
  • Attackers disable or delete CloudTrail/Activity Logs in compromised accounts to erase evidence of malicious activity
  • Configuration drift or unauthorized infrastructure changes occur without attribution or accountability
  • Insider threats exfiltrate data or modify critical resources without triggering alerts due to lack of monitoring
  • Incident response and forensic investigations are impaired by log gaps, missing regional coverage, or decentralized storage
  • Compliance violations (GDPR, HIPAA, PCI-DSS audit trail requirements) occur due to insufficient retention or integrity controls
  • Delayed detection of compromised credentials or stolen access keys used to manipulate cloud resources

Testing procedure

How an auditor verifies this control

  1. Inventory all active cloud accounts, subscriptions, projects, and organizational units across AWS, Azure, and GCP environments in scope.
  2. Review control-plane logging configurations (CloudTrail trails, Azure Activity Log diagnostic settings, GCP Audit Logs) to verify enablement status for each account/subscription and confirm multi-region or global coverage.
  3. Examine log delivery destinations to confirm centralization into a dedicated logging account, Log Analytics workspace, Cloud Storage bucket, or third-party SIEM with appropriate access controls.
  4. Verify integrity protections such as log file validation (CloudTrail), immutable storage settings, or write-once-read-many configurations to prevent tampering or deletion.
  5. Sample recent control-plane log entries (within past 7 days) and validate presence of critical event types including IAM changes, security group modifications, resource deletions, and authentication events.
  6. Review SIEM or monitoring tool configurations to confirm automated alerting rules exist for high-risk events such as CloudTrail deletion attempts, root account usage, or unusual API call patterns.
  7. Test alert generation by simulating a control-plane event (e.g., creating a test IAM role or modifying a network security group) and verifying timely alert delivery to security operations personnel.
  8. Examine log retention policies and backup procedures to confirm compliance with regulatory requirements and organizational retention standards (typically 90 days to 7 years).
Evidence required Configuration exports showing CloudTrail trail settings with multi-region and management event logging enabled, Azure Monitor diagnostic settings routing Activity Logs to centralized workspace, and GCP Audit Log configurations for Admin/Data Access activities. Sample log entries demonstrating capture of privileged operations across accounts with timestamps and actor attribution. Screenshots or configuration files showing SIEM ingestion pipelines, alert rule definitions, and evidence of recent alert generation for control-plane events.
Pass criteria Control-plane logging is enabled across all in-scope accounts/subscriptions with multi-region coverage, logs are centralized into a protected repository with integrity controls, retention meets or exceeds regulatory requirements, and automated monitoring with documented alert response is operational.