NIST 800-53 demands precision and proof. CloudTrail holds the proof, but only if you know how to pull it. A good query runbook turns raw events into actionable answers—fast, repeatable, auditable. Without one, compliance checks become manual drudgery and risk gaps slip through.
Why NIST 800-53 and CloudTrail matter together
NIST 800-53 is a catalog of security controls. Many controls require event traceability: who did what, when, and from where. CloudTrail records AWS API calls and console logins. Linking them means you can detect unauthorized changes, confirm control effectiveness, and prove compliance during audits.
Core queries for NIST 800-53 compliance
A well-built runbook contains focused queries aligned with specific controls:
- AC-2 (Account Management): Query for creation, deletion, or modification of IAM users, roles, and policies.
- AU-6 (Audit Review, Analysis, and Reporting): Scan for failed login attempts, privilege escalations, and unusual API calls within a defined time window.
- IA-2 (Identification and Authentication): Detect use of root credentials or authentication from unknown IP ranges.
- CM-6 (Configuration Settings): Identify changes to security group rules, bucket policies, and encryption settings.
Each query should include exact CloudTrail event names, relevant fields (eventSource, eventName, userIdentity.type), filters for time ranges, and logic to distinguish routine from suspicious actions.