In this workshop, you will create a secure data bunker. A data bunker is a secure account that stores important security data in a secure location. Make sure that only members of your security team have access to this account. In this lab, you will create a new security account, create a secure S3 bucket in that account, and then enable CloudTrail so that our organization sends these logs to the bucket in the secure data account. You may also want to consider what other data you need in there, such as secure backups.

A best practice is to use AWS Control Tower to set up your Well-Architected landing zone. The steps in this lab cover what was configured for the Control Tower Log Storage Account.
Sign in to your AWS Organizations management account.

On the AWS Organizations home page, select Add An AWS Account.

Fill in the new account information
AccountSecurityLogsexample@gmail.comOrganizationAccountAccessRole

(Optional) If your role does not have permissions to assume any roles, you will also need to add an IAM policy. AWS Administrator policies have this policy by default, otherwise follow the steps in the AWS Organizations documentation to grant access to the role. Consider implementing best practices as a baseline, such as locking down your AWS account’s root user access key and using multi-factor authentication
Complete adding an account and wait for the request to be processed.

Navigate to Settings and note your Organization ID.

Log in to your organization’s logging account (AccountSecurityLogs).
Navigate to AWS Key Management Service (KMS), select Create a key.


CloudTrailKeyKey to encrypt CloudTrail logs


In the logging account (AccountSecurityLogs) that is still in your organization’s logging account.
Navigate to Amazon S3, select Create bucket

securelogbucket2025
Select the bucket you just created.

Then select the Permissions tab.

Replace Bucket Policy with the following content:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AWSCloudTrailAclCheck20150319",
"Effect": "Allow",
"Principal": {
"Service": "cloudtrail.amazonaws.com"
},
"Action": "s3:GetBucketAcl",
"Resource": "arn:aws:s3:::[bucket]"
},
{
"Sid": "AWSCloudTrailWrite20150319",
"Effect": "Allow",
"Principal": {
"Service": "cloudtrail.amazonaws.com"
},
"Action": "s3:PutObject",
"Resource": "arn:aws:s3:::[bucket]/AWSLogs/*",
"Condition": {
"StringEquals": {
"s3:x-amz-acl": "bucket-owner-full-control"
}
}
},
{
"Sid": "AWSCloudTrailWrite201503109",
"Effect": "Allow",
"Principal": {
"Service": "cloudtrail.amazonaws.com"
},
"Action": "s3:PutObject",
"Resource": "arn:aws:s3:::[bucket]/AWSLogs/[organization id]/*",
"Condition": {
"StringEquals": {
"s3:x-amz-acl": "bucket-owner-full-control"
}
}
}
]
}


Follow these steps to prevent OrganizationAccountAccessRole from making further changes to this account.
Navigate to IAM and select Role. Select the organization account access role for your organization. The default is OrganizationAccountAccessRole

Select Add Polices

Attach the AWS-managed ReadOnlyAccess Policy.


Switch back to the management account.
Navigate to CloudTrail. In the left menu bar, select Trail. Then, select the Create trail button

Enter the information according to the following instructions:
OrganizationTrail
