Skip to main content

💼 4.9 Ensure AWS Config configuration changes are monitored (Manual)

  • Contextual name: 💼 4.9 Ensure AWS Config configuration changes are monitored (Manual)
  • ID: /frameworks/cis-aws-v4.0.1/04/09
  • Located in: 💼 4 Monitoring

Description

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs or an external Security Information and Event Management (SIEM) environment, and establishing corresponding metric filters and alarms.

It is recommended that a metric filter and alarm be established for detecting changes to AWS Config's configurations.

Similar

  • Sections
    • /frameworks/cis-aws-v5.0.0/04/09
    • /frameworks/cis-aws-v4.0.0/04/09

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v4.0.0 → 💼 4.9 Ensure AWS Config configuration changes are monitored (Manual)1
💼 CIS AWS v5.0.0 → 💼 4.9 Ensure AWS Config configuration changes are monitored (Manual)1

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 CIS AWS v4.0.0 → 💼 4.9 Ensure AWS Config configuration changes are monitored (Manual)1
💼 CIS AWS v5.0.0 → 💼 4.9 Ensure AWS Config configuration changes are monitored (Manual)1

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS CloudTrail Config Configuration Changes Monitoring is not enabled 🟢🟢 x3