Control: AWS > CIS v3.0 > 4 - Monitoring
Covers recommendations for configuring AWS monitoring features.
Primary Policies
The following policies can be used to configure this control:
- 4 - Monitoring > 4.01 - Ensure unauthorized API calls are monitored
- 4 - Monitoring > 4.02 - Ensure management console sign-in without MFA is monitored
- 4 - Monitoring > 4.03 - Ensure usage of 'root' account is monitored
- 4 - Monitoring > 4.04 - Ensure IAM policy changes are monitored
- 4 - Monitoring > 4.05 - Ensure CloudTrail configuration changes are monitored
- 4 - Monitoring > 4.06 - Ensure AWS Management Console authentication failures are monitored
- 4 - Monitoring > 4.07 - Ensure disabling or scheduled deletion of customer created CMKs is monitored
- 4 - Monitoring > 4.08 - Ensure S3 bucket policy changes are monitored
- 4 - Monitoring > 4.09 - Ensure AWS Config configuration changes are monitored
- 4 - Monitoring > 4.10 - Ensure security group changes are monitored
- 4 - Monitoring > 4.11 - Ensure Network Access Control Lists (NACL) changes are monitored
- 4 - Monitoring > 4.12 - Ensure changes to network gateways are monitored
- 4 - Monitoring > 4.13 - Ensure route table changes are monitored
- 4 - Monitoring > 4.14 - Ensure VPC changes are monitored
- 4 - Monitoring > 4.15 - Ensure AWS Organizations changes are monitored
- 4 - Monitoring > 4.16 - Ensure AWS Security Hub is enabled
- 4 - Monitoring
- 4 - Monitoring > Maximum Attestation Duration
Category
In Your Workspace
Developers
- tmod:@turbot/aws-cisv3-0#/control/types/s04
- tmod:@turbot/cis#/control/categories/cis
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-cisv3-0#/control/types/s04"
Get Controls
Control Type URI
Category URI
GraphQL
CLI