Mods
AWS

Policy: AWS > CIS v2.0 > 4 - Monitoring > 4.05 - Ensure CloudTrail configuration changes are monitored

Configures auditing against a CIS Benchmark item.

Level: 1

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs, or an external Security information and event management (SIEM) environment, where metric filters and alarms can be established.

It is recommended that a metric filter and alarm be utilized for detecting changes to CloudTrail's configurations.

Resource Types

This policy targets the following resource types:

Primary Policy

This policy is used with the following primary policy:

Controls

Policy Specification

Schema Type
string
Default
Per AWS > CIS v2.0 > 4 - Monitoring
Valid Values [YAML]
  • Per AWS > CIS v2.0 > 4 - Monitoring
    
  • Skip
    
  • Check: Benchmark
    

Category

In Your Workspace

Developers