Skip to main content

๐Ÿ’ผ 4 Monitoring

  • Contextual name: ๐Ÿ’ผ 4 Monitoring
  • ID: /frameworks/cis-aws-v1.4.0/04
  • Located in: ๐Ÿ’ผ CIS AWS v1.4.0

Descriptionโ€‹

This section contains recommendations for configuring AWS to assist with monitoring and responding to account activities.

Similarโ€‹

  • Internal
    • ID: dec-b-85ff45d0

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 4.1 Ensure a log metric filter and alarm exist for unauthorized API calls1
๐Ÿ’ผ 4.2 Ensure a log metric filter and alarm exist for Management Console sign-in without MFA1
๐Ÿ’ผ 4.3 Ensure a log metric filter and alarm exist for usage of 'root' account1
๐Ÿ’ผ 4.4 Ensure a log metric filter and alarm exist for IAM policy changes1
๐Ÿ’ผ 4.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes1
๐Ÿ’ผ 4.6 Ensure a log metric filter and alarm exist for AWS Management Console authentication failures1
๐Ÿ’ผ 4.7 Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs1
๐Ÿ’ผ 4.8 Ensure a log metric filter and alarm exist for S3 bucket policy changes1
๐Ÿ’ผ 4.9 Ensure a log metric filter and alarm exist for AWS Config configuration changes1
๐Ÿ’ผ 4.10 Ensure a log metric filter and alarm exist for security group changes1
๐Ÿ’ผ 4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)1
๐Ÿ’ผ 4.12 Ensure a log metric filter and alarm exist for changes to network gateways1
๐Ÿ’ผ 4.13 Ensure a log metric filter and alarm exist for route table changes1
๐Ÿ’ผ 4.14 Ensure a log metric filter and alarm exist for VPC changes1
๐Ÿ’ผ 4.15 Ensure a log metric filter and alarm exists for AWS Organizations changes1