Skip to main content

💼 4.3 Ensure usage of 'root' account is monitored - Level 1 (Manual)

  • ID: /frameworks/cis-aws-v3.0.0/04/03

Description

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs, or an external Security information and event management (SIEM) environment, and establishing corresponding metric filters and alarms.

It is recommended that a metric filter and alarm be established for 'root' login attempts to detect the unauthorized use, or attempts to use the root account.

Similar

  • Sections
    • /frameworks/cis-aws-v4.0.0/04/03
    • /frameworks/cis-aws-v2.0.0/04/03
  • Internal
    • ID: dec-c-f6380140

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v2.0.0 → 💼 4.3 Ensure usage of 'root' account is monitored - Level 1 (Manual)1no data
💼 CIS AWS v4.0.0 → 💼 4.3 Ensure usage of the 'root' account is monitored (Manual)1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CIS AWS v2.0.0 → 💼 4.3 Ensure usage of 'root' account is monitored - Level 1 (Manual)1no data
💼 CIS AWS v4.0.0 → 💼 4.3 Ensure usage of the 'root' account is monitored (Manual)1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS CloudTrail Root Account Usage Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1no data