Check provider logo

MQ broker has general logging enabled and, for ActiveMQ, audit logging enabled

mq_broker_logging_enabled

Severitylow
Servicemq
by Prowler

Amazon MQ brokers have logging to CloudWatch Logs enabled per engine type: ActiveMQ requires both general and audit logs; RabbitMQ requires general logs.

Risk

Missing broker logs creates blind spots in authentication events, administrative changes, and broker failures. Adversaries can act without detection, enabling unauthorized access and message tampering (confidentiality/integrity) and hindering incident response and root-cause analysis (availability).

Run this check with Prowler CLI

prowler aws --checks mq_broker_logging_enabled

Recommendation

Enable centralized CloudWatch Logs for brokers. For ActiveMQ, turn on both general and audit logs; for RabbitMQ, enable general logs.

Apply least privilege to log access, set retention, and create alerts for anomalous events to strengthen defense in depth.

Remediation

CLI

aws mq update-broker --broker-id <example_resource_id> --logs Audit=true,General=true

Native IaC
Terraform
Other
  1. In the AWS Console, go to Amazon MQ > Brokers
  2. Select <example_resource_name> and choose Edit
  3. In Log settings:
    • For ActiveMQ: enable General logs and Audit logs
    • For RabbitMQ: enable General logs only
  4. Save changes and reboot if prompted

Source Code

Resource Type

AwsAmazonMQBroker

References