Policy: AWS > CIS v1.4 > 4 - Monitoring > 4.11 - Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) (Automated)
Configures auditing against a CIS Benchmark item.
Level: 2 (Scored)
Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs and establishing corresponding metric filters and alarms. NACLs are used as a stateless packet filter to control ingress and egress traffic for subnets within a VPC. It is recommended that a metric filter and alarm be established for changes made to NACLs.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
- AWS > CIS v1.4
- AWS > CIS v1.4 > 4 - Monitoring > 4.11 - Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) (Automated)
- AWS > CIS v1.4 > 4 - Monitoring
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/v071103
- tmod:@turbot/aws-cisv1-4#/policy/types/r0411
- turbot graphql policy-type --id "tmod:@turbot/aws-cisv1-4#/policy/types/r0411"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-cisv1-4#/policy/types/r0411"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI