⭐ Repository → 💼 CIS AWS v2.0.0 → 💼 4 Monitoring
💼 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual)
- ID:
/frameworks/cis-aws-v2.0.0/04/05
Description
Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs, or an external Security information and event management (SIEM) environment, where metric filters and alarms can be established.
It is recommended that a metric filter and alarm be utilized for detecting changes to CloudTrail's configurations.
Similar
- Sections
/frameworks/cis-aws-v3.0.0/04/05
/frameworks/cis-aws-v1.5.0/04/05
- Internal
- ID:
dec-c-656b6ccd
- ID:
Similar Sections (Take Policies From)
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 CIS AWS v1.5.0 → 💼 4.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes - Level 1 (Automated) | 1 | no data | |||
💼 CIS AWS v3.0.0 → 💼 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual) | 1 | no data |
Similar Sections (Give Policies To)
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 CIS AWS v1.5.0 → 💼 4.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes - Level 1 (Automated) | 1 | no data | |||
💼 CIS AWS v3.0.0 → 💼 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual) | 1 | no data |
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|
Policies (1)
Policy | Logic Count | Flags | Compliance |
---|---|---|---|
🛡️ AWS CloudTrail Configuration Changes Monitoring is not enabled🟢⚪ | 🟢 x2, ⚪ x1 | no data |