

# redshift-audit-logging-enabled
<a name="redshift-audit-logging-enabled"></a>

Checks if Amazon Redshift clusters are logging audits to a specific bucket. The rule is NON\$1COMPLIANT if audit logging is not enabled for a Redshift cluster or if the '`bucketNames`' parameter is provided but the audit logging destination does not match. 



**Identifier:** REDSHIFT\$1AUDIT\$1LOGGING\$1ENABLED

**Resource Types:** AWS::Redshift::Cluster

**Trigger type:** Configuration changes

**AWS Region:** All supported AWS regions except Asia Pacific (New Zealand), China (Beijing), Asia Pacific (Thailand), Asia Pacific (Jakarta), Middle East (UAE), Asia Pacific (Hyderabad), Asia Pacific (Malaysia), Asia Pacific (Melbourne), AWS GovCloud (US-East), AWS GovCloud (US-West), Mexico (Central), Israel (Tel Aviv), Asia Pacific (Taipei), Canada West (Calgary), Europe (Spain), China (Ningxia), Europe (Zurich) Region

**Parameters:**

bucketNames (Optional)Type: CSV  
Comma-separated list of Amazon S3 bucket names for storing audit logs.

## AWS CloudFormation template
<a name="w2aac20c16c17b7e1281c19"></a>

To create AWS Config managed rules with AWS CloudFormation templates, see [Creating AWS Config Managed Rules With AWS CloudFormation Templates](aws-config-managed-rules-cloudformation-templates.md).