Mods
AWS

Policy: AWS > CIS v2.0 > 4 - Monitoring > 4.11 - Ensure Network Access Control Lists (NACL) changes are monitored

Configures auditing against a CIS Benchmark item.

Level: 2

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs, or an external Security information and event management (SIEM) environment, and establishing corresponding metric filters and alarms. NACLs are used as a stateless packet filter to control ingress and egress traffic for subnets within a VPC. It is recommended that a metric filter and alarm be established for changes made to NACLs.

Resource Types

This policy targets the following resource types:

Primary Policy

This policy is used with the following primary policy:

Controls

Policy Specification

Schema Type
string
Default
Per AWS > CIS v2.0 > 4 - Monitoring
Valid Values [YAML]
  • Per AWS > CIS v2.0 > 4 - Monitoring
    
  • Skip
    
  • Check: Benchmark
    

Category

In Your Workspace

Developers