Skip to main content

💼 4.4 Ensure a log metric filter and alarm exist for IAM policy changes

  • Contextual name: 💼 4.4 Ensure a log metric filter and alarm exist for IAM policy changes
  • ID: /frameworks/cis-aws-v1.3.0/04/04
  • Located in: 💼 4 Monitoring

Description

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs and establishing corresponding metric filters and alarms. It is recommended that a metric filter and alarm be established changes made to Identity and Access Management (IAM) policies.

Similar

  • Sections
    • /frameworks/cis-aws-v1.4.0/04/04
    • /frameworks/cis-aws-v1.2.0/03/04
  • Internal
    • ID: dec-c-e360eb00

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.2.0 → 💼 3.4 Ensure a log metric filter and alarm exist for IAM policy changes1
💼 CIS AWS v1.4.0 → 💼 4.4 Ensure a log metric filter and alarm exist for IAM policy changes1

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v1.2.0 → 💼 3.4 Ensure a log metric filter and alarm exist for IAM policy changes1
💼 CIS AWS v1.4.0 → 💼 4.4 Ensure a log metric filter and alarm exist for IAM policy changes1

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS CloudTrail IAM Policy Changes Monitoring is not enabled 🟢🟢 x3