Medium
RDS
Regional
Aurora MySQL DB clusters should have audit logging enabled
NIST 800-53HIPAA
Description
Checks if Amazon Aurora MySQL DB clusters are configured to have audit logging enabled. The control fails if the Aurora MySQL cluster is not configured to enable audit logging by setting the server_audit_logs parameter to 1.
Remediation
To enable audit logging for Aurora MySQL clusters, follow these steps:
Steps
- Sign in to the AWS Management Console and open the Amazon RDS console.
- In the navigation pane, choose 'Databases'.
- Select the identified Aurora MySQL cluster that requires audit logging to be enabled.
- Choose 'Modify'.
- In the 'Database Options' section, locate the 'DB cluster parameter group' setting.
- If using a custom parameter group, modify the 'server_audit_logs' parameter to '1'.
- If using the default parameter group, create a new custom parameter group and set 'server_audit_logs' to '1'.
- Apply the parameter group to your Aurora cluster.
- Scroll to the bottom of the page and choose 'Continue'.
- On the summary page, review your changes. Select 'Apply immediately' to enable audit logging right away, or choose to apply them during the next maintenance window.
- Click 'Modify DB Cluster' to apply the changes.
- For detailed guidance, refer to the AWS documentation: 'Enabling MySQL audit logging' in the Amazon RDS User Guide.
Compliance
NIST 800-53HIPAA