CloudTrail Encryption
By default, the log files delivered by CloudTrail to your bucket are encrypted by server-side encryption with S3-managed encryption keys (SSE-S3).
To provide a security layer that is directly manageable, you can instead use server-side encryption with KMS-managed keys (SSE-KMS) for your CloudTrail log files.
Enabling server-side encryption encrypts the log files but not the digest files with SSE-KMS.
Digest files are encrypted with S3-managed encryption keys (SSE-S3).
To use SSE-KMS with CloudTrail, you create and manage a KMS key, also known as a CMK.
You attach a policy to the key that determines which users can use the key for encrypting and decrypting CloudTrail log files and the decryption is seamless through S3.
When authorized users of the key read CloudTrail log files, S3 manages the decryption, and the authorized users are able to read log files in unencrypted form.
Last updated