Skip to main content

πŸ’Ό 4.11 Ensure Network Access Control List (NACL) changes are monitored (Manual)

  • Contextual name: πŸ’Ό 4.11 Ensure Network Access Control List (NACL) changes are monitored (Manual)
  • ID: /frameworks/cis-aws-v4.0.1/04/11
  • Located in: πŸ’Ό 4 Monitoring

Description​

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs or an external Security Information and Event Management (SIEM) environment, and establishing corresponding metric filters and alarms.

NACLs are used as a stateless packet filter to control ingress and egress traffic for subnets within a VPC. It is recommended that a metric filter and alarm be established for any changes made to NACLs.

Similar​

  • Sections
    • /frameworks/cis-aws-v5.0.0/04/11
    • /frameworks/cis-aws-v4.0.0/04/11

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v4.0.0 β†’ πŸ’Ό 4.11 Ensure Network Access Control List (NACL) changes are monitored (Manual)1
πŸ’Ό CIS AWS v5.0.0 β†’ πŸ’Ό 4.11 Ensure Network Access Control List (NACL) changes are monitored (Manual)1

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS AWS v4.0.0 β†’ πŸ’Ό 4.11 Ensure Network Access Control List (NACL) changes are monitored (Manual)1
πŸ’Ό CIS AWS v5.0.0 β†’ πŸ’Ό 4.11 Ensure Network Access Control List (NACL) changes are monitored (Manual)1

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS CloudTrail Network Access Control Lists Changes Monitoring is not enabled 🟒🟒 x3