Skip to main content

CCC.AuditLog.C04: Ensure Access Logging Is Enabled on the Audit Log Bucket

Control ID:CCC.AuditLog.C04
Title:Ensure Access Logging Is Enabled on the Audit Log Bucket
Objective:Ensure that access logging is enabled for the audit log storage bucket to capture all requests made to the bucket, providing an audit trail of data access.
Control Family:
Integrity

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.Core.TH01Access is Granted to Unauthorized UsersLogic designed to give different permissions to different entities may be misconfigured or manipulated, allowing unauthorized entities to access restricted parts of the service, its data, or its child resources. This could result in a loss of data confidentiality or tolerance of unauthorized actions which impact the integrity and availability of resources and data.
1
1
0
CCC.Core.TH09Runtime Logs are Read by Unauthorized EntitiesUnauthorized access to logs may expose valuable information about the system's configuration, operations, and security mechanisms. This could jeopardize system availability through the exposure of vulnerabilities and support the planning of attacks on the service, system, or network. If logs are not adequately sanitized, this may also directly impact the confidentiality of sensitive data.
1
1
0

Related Capabilities

IDTitleDescription
CCC.Core.F06Access ControlThe service automatically enforces user configurations to restrict or allow access to a specific component or a child resource based on factors such as user identities, roles, groups, or attributes.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
DE.CM-1
0
-
NIST_800_53
AU-2
0
-
NIST_800_53
AU-3
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.AuditLog.C04.TR01When audit log buckets are created then verify that server access logging MUST be enabled for the audit log bucket, with logs delivered to a separate, secure logging bucket.
tlp-red
tlp-amber