💼 4.7 Ensure disabling or scheduled deletion of customer created CMKs is monitored - Level 2 (Manual)
- ID:
/frameworks/cis-aws-v2.0.0/04/07
Description
Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs, or an external Security information and event management (SIEM) environment, and establishing corresponding metric filters and alarms.
It is recommended that a metric filter and alarm be established for customer created CMKs which have changed state to disabled or scheduled deletion.
Similar
- Sections
/frameworks/cis-aws-v3.0.0/04/07/frameworks/cis-aws-v1.5.0/04/07
- Internal
- ID:
dec-c-b8a399eb
- ID:
Similar Sections (Take Policies From)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS AWS v1.5.0 → 💼 4.7 Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs - Level 2 (Automated) | 1 | no data | |||
| 💼 CIS AWS v3.0.0 → 💼 4.7 Ensure disabling or scheduled deletion of customer created CMKs is monitored - Level 2 (Manual) | 1 | no data |
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS AWS v1.5.0 → 💼 4.7 Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs - Level 2 (Automated) | 1 | no data | |||
| 💼 CIS AWS v3.0.0 → 💼 4.7 Ensure disabling or scheduled deletion of customer created CMKs is monitored - Level 2 (Manual) | 1 | no data |
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|
Policies (1)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ AWS CloudTrail Disable CMK or Schedule CMK Deletion Events Monitoring is not enabled🟢⚪ | 🟢 x2, ⚪ x1 | no data |