Skip to main content

Repository → 💼 CIS AWS v2.0.0 → 💼 4 Monitoring

💼 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual)

  • ID: /frameworks/cis-aws-v2.0.0/04/05

Description

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs, or an external Security information and event management (SIEM) environment, where metric filters and alarms can be established.

It is recommended that a metric filter and alarm be utilized for detecting changes to CloudTrail's configurations.

Similar

  • Sections
    • /frameworks/cis-aws-v3.0.0/04/05
    • /frameworks/cis-aws-v1.5.0/04/05
  • Internal
    • ID: dec-c-656b6ccd

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v1.5.0 → 💼 4.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes - Level 1 (Automated)1no data
💼 CIS AWS v3.0.0 → 💼 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual)1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v1.5.0 → 💼 4.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes - Level 1 (Automated)1no data
💼 CIS AWS v3.0.0 → 💼 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual)1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS CloudTrail Configuration Changes Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1no data