Skip to main content

πŸ’Ό 4.5 Ensure CloudTrail configuration changes are monitored (Manual)

  • Contextual name: πŸ’Ό 4.5 Ensure CloudTrail configuration changes are monitored (Manual)
  • ID: /frameworks/cis-aws-v4.0.0/04/05
  • Located in: πŸ’Ό 4 Monitoring

Description​

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs or an external Security Information and Event Management (SIEM) environment, and establishing corresponding metric filters and alarms.

It is recommended that a metric filter and alarm be used to detect changes to CloudTrail's configurations.

Similar​

  • Sections
    • /frameworks/cis-aws-v4.0.1/04/05
    • /frameworks/cis-aws-v3.0.0/04/05

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v3.0.0 β†’ πŸ’Ό 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual)1
πŸ’Ό CIS AWS v4.0.1 β†’ πŸ’Ό 4.5 Ensure CloudTrail configuration changes are monitored (Manual)1

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v3.0.0 β†’ πŸ’Ό 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual)1
πŸ’Ό CIS AWS v4.0.1 β†’ πŸ’Ό 4.5 Ensure CloudTrail configuration changes are monitored (Manual)1

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS CloudTrail Configuration Changes Monitoring is not enabled 🟒🟒 x3