Control: AWS > CIS v1.4 > 4 - Monitoring
Covers recommendations for configuring AWS monitoring features.
Primary Policies
The following policies can be used to configure this control:
- 4 - Monitoring > 4.01 - Ensure a log metric filter and alarm exist for unauthorized API calls (Automated)
- 4 - Monitoring > 4.02 - Ensure a log metric filter and alarm exist for Management Console sign-in without MFA (Automated)
- 4 - Monitoring > 4.03 - Ensure a log metric filter and alarm exist for usage of 'root' account (Automated)
- 4 - Monitoring > 4.04 - Ensure a log metric filter and alarm exist for IAM policy changes (Automated)
- 4 - Monitoring > 4.05 - Ensure a log metric filter and alarm exist for CloudTrail configuration changes (Automated)
- 4 - Monitoring > 4.06 - Ensure a log metric filter and alarm exist for AWS Management Console authentication failures (Automated)
- 4 - Monitoring > 4.07 - Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs (Automated)
- 4 - Monitoring > 4.08 - Ensure a log metric filter and alarm exist for S3 bucket policy changes (Automated)
- 4 - Monitoring > 4.09 - Ensure a log metric filter and alarm exist for AWS Config configuration changes (Automated)
- 4 - Monitoring > 4.10 - Ensure a log metric filter and alarm exist for security group changes (Automated)
- 4 - Monitoring > 4.11 - Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) (Automated)
- 4 - Monitoring > 4.12 - Ensure a log metric filter and alarm exist for changes to network gateways (Automated)
- 4 - Monitoring > 4.13 - Ensure a log metric filter and alarm exist for route table changes (Automated)
- 4 - Monitoring > 4.14 - Ensure a log metric filter and alarm exist for VPC changes (Automated)
- 4 - Monitoring > 4.15 - Ensure a log metric filter and alarm exists for AWS Organizations changes (Automated)
- 4 - Monitoring
- 4 - Monitoring > Maximum Attestation Duration
Category
In Your Workspace
Developers
- tmod:@turbot/aws-cisv1-4#/control/types/s04
- tmod:@turbot/cis#/control/categories/cis
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-cisv1-4#/control/types/s04"
Get Controls
Control Type URI
Category URI
GraphQL
CLI