Skip to main content

πŸ’Ό 4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)

  • Contextual name: πŸ’Ό 4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)
  • ID: /frameworks/cis-aws-v1.3.0/04/11
  • Located in: πŸ’Ό 4 Monitoring

Description​

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs and establishing corresponding metric filters and alarms. NACLs are used as a stateless packet filter to control ingress and egress traffic for subnets within a VPC. It is recommended that a metric filter and alarm be established for changes made to NACLs.

Similar​

  • Sections
    • /frameworks/cis-aws-v1.4.0/04/11
    • /frameworks/cis-aws-v1.2.0/03/11
  • Internal
    • ID: dec-c-4b8d4ab9

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v1.2.0 β†’ πŸ’Ό 3.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)1
πŸ’Ό CIS AWS v1.4.0 β†’ πŸ’Ό 4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)1

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v1.2.0 β†’ πŸ’Ό 3.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)1
πŸ’Ό CIS AWS v1.4.0 β†’ πŸ’Ό 4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)1

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS CloudTrail Network Access Control Lists Changes Monitoring is not enabled 🟒🟒 x3