

# cloudtrail-s3-dataevents-enabled
<a name="cloudtrail-s3-dataevents-enabled"></a>

Checks if at least one AWS CloudTrail trail is logging Amazon Simple Storage Service (Amazon S3) data events for all S3 buckets. The rule is NON\$1COMPLIANT if there are trails or if no trails record S3 data events. 



**Identifier:** CLOUDTRAIL\$1S3\$1DATAEVENTS\$1ENABLED

**Trigger type:** Periodic

**AWS Region:** All supported AWS regions

**Parameters:**

S3BucketNames (Optional)Type: String  
Comma-separated list of S3 bucket names for which data events logging should be enabled. Default behavior checks for all S3 buckets.

## AWS CloudFormation template
<a name="w2aac20c16c17b7d333c17"></a>

To create AWS Config managed rules with AWS CloudFormation templates, see [Creating AWS Config Managed Rules With AWS CloudFormation Templates](aws-config-managed-rules-cloudformation-templates.md).