Ensure CloudTrail Bucket has MFA Delete Enabled

AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. Since this holds all audit logs, it is important that the S3 bucket that stores the data is fully secured. This is why CloudTrail MFADelete enabled is a security best practice. Having a full inventory of your CloudTrails with current logging status across all of your accounts can help with NIST, HIPPA, GDPR & PCI-DSS compliance.

Audit & Remediation



  • Copy the name of the S3 bucket in order for us to validate the permissions in S3.
  • Unfortunately MFADelete can only be validated via command line. Run the following code:
aws s3api get-bucket-versioning	--bucket intelligent-discovery-trail-logging
  • If you receive no response or do not receive MFADelete=Enabled then MFADelete is not enabled. Run the following command to enable this.
aws s3api put-bucket-versioning --bucket intelligent-discovery-trail-logging --versioning-configuration Status=Enabled,MFADelete=Enabled --mfa 'arn:aws:iam::111111111111:mfa/root-account-mfa-device 232323'
See all certificates in a single place!

Do you want to see all of your ACM certificates in once place for all regions and all accounts?
Login to our online demo to see exactly what this looks like.


Other Key Features


Consolidate your inventory management with consistent and frequent security logs, inventories, and change logs. Dashboard reporting for extensive analytical value.

learn more +

Cost & Usage

Access consolidated capacity, cost, and volume tools in a scaling environment without impacting production or breaking the bank.

learn more +