Skip to main content

💼 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual)

  • Contextual name: 💼 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual)
  • ID: /frameworks/cis-aws-v3.0.0/04/05
  • Located in: 💼 4 Monitoring

Description

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs, or an external Security information and event management (SIEM) environment, where metric filters and alarms can be established.

It is recommended that a metric filter and alarm be utilized for detecting changes to CloudTrail's configurations.

Similar

  • Sections
    • /frameworks/cis-aws-v4.0.0/04/05
    • /frameworks/cis-aws-v2.0.0/04/05
  • Internal
    • ID: dec-c-0ef5b17d

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v2.0.0 → 💼 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual)1
💼 CIS AWS v4.0.0 → 💼 4.5 Ensure CloudTrail configuration changes are monitored (Manual)1

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v2.0.0 → 💼 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual)1
💼 CIS AWS v4.0.0 → 💼 4.5 Ensure CloudTrail configuration changes are monitored (Manual)1

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS CloudTrail Configuration Changes Monitoring is not enabled 🟢🟢 x3