Skip to main content

πŸ’Ό 4.6 Ensure AWS Management Console authentication failures are monitored - Level 2 (Manual)

  • Contextual name: πŸ’Ό 4.6 Ensure AWS Management Console authentication failures are monitored - Level 2 (Manual)
  • ID: /frameworks/cis-aws-v3.0.0/04/06
  • Located in: πŸ’Ό 4 Monitoring

Description​

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs, or an external Security information and event management (SIEM) environment, and establishing corresponding metric filters and alarms.

It is recommended that a metric filter and alarm be established for failed console authentication attempts.

Similar​

  • Sections
    • /frameworks/cis-aws-v4.0.0/04/06
    • /frameworks/cis-aws-v2.0.0/04/06
  • Internal
    • ID: dec-c-a1de0042

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v2.0.0 β†’ πŸ’Ό 4.6 Ensure AWS Management Console authentication failures are monitored - Level 2 (Manual)1
πŸ’Ό CIS AWS v4.0.0 β†’ πŸ’Ό 4.6 Ensure AWS Management Console authentication failures are monitored (Manual)1

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v2.0.0 β†’ πŸ’Ό 4.6 Ensure AWS Management Console authentication failures are monitored - Level 2 (Manual)1
πŸ’Ό CIS AWS v4.0.0 β†’ πŸ’Ό 4.6 Ensure AWS Management Console authentication failures are monitored (Manual)1

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS CloudTrail Management Console Authentication Failures Monitoring is not enabled 🟒🟒 x3