Ensure CloudTrail Bucket has MFA Delete Enabled
AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. Since this holds all audit logs, it is important that the S3 bucket that stores the data is fully secured. This is why CloudTrail MFADelete enabled is a security best practice. Having a full inventory of your CloudTrails with current logging status across all of your accounts can help with NIST, HIPPA, GDPR & PCI-DSS compliance.