Policy: AWS > CIS v3.0 > 4 - Monitoring
Covers recommendations for configuring AWS monitoring features.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 4.01 - Ensure unauthorized API calls are monitored
- 4.02 - Ensure management console sign-in without MFA is monitored
- 4.03 - Ensure usage of 'root' account is monitored
- 4.04 - Ensure IAM policy changes are monitored
- 4.05 - Ensure CloudTrail configuration changes are monitored
- 4.06 - Ensure AWS Management Console authentication failures are monitored
- 4.07 - Ensure disabling or scheduled deletion of customer created CMKs is monitored
- 4.08 - Ensure S3 bucket policy changes are monitored
- 4.09 - Ensure AWS Config configuration changes are monitored
- 4.10 - Ensure security group changes are monitored
- 4.11 - Ensure Network Access Control Lists (NACL) changes are monitored
- 4.12 - Ensure changes to network gateways are monitored
- 4.13 - Ensure route table changes are monitored
- 4.14 - Ensure VPC changes are monitored
- 4.15 - Ensure AWS Organizations changes are monitored
- 4.16 - Ensure AWS Security Hub is enabled
- Maximum Attestation Duration
Controls
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/aws-cisv3-0#/policy/types/s04
- turbot graphql policy-type --id "tmod:@turbot/aws-cisv3-0#/policy/types/s04"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-cisv3-0#/policy/types/s04"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI