Skip to main content

💼 4.8 Ensure S3 bucket policy changes are monitored - Level 1 (Manual)

  • ID: /frameworks/cis-aws-v2.0.0/04/08

Description

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs, or an external Security information and event management (SIEM) environment, and establishing corresponding metric filters and alarms.

It is recommended that a metric filter and alarm be established for changes to S3 bucket policies.

Similar

  • Sections
    • /frameworks/cis-aws-v3.0.0/04/08
    • /frameworks/cis-aws-v1.5.0/04/08
  • Internal
    • ID: dec-c-2068821a

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v1.5.0 → 💼 4.8 Ensure a log metric filter and alarm exist for S3 bucket policy changes - Level 1 (Automated)1no data
💼 CIS AWS v3.0.0 → 💼 4.8 Ensure S3 bucket policy changes are monitored - Level 1 (Manual)1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v1.5.0 → 💼 4.8 Ensure a log metric filter and alarm exist for S3 bucket policy changes - Level 1 (Automated)1no data
💼 CIS AWS v3.0.0 → 💼 4.8 Ensure S3 bucket policy changes are monitored - Level 1 (Manual)1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS CloudTrail S3 Bucket Policy Changes Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1no data