Policy: AWS > CIS v6.0 > 5 - Monitoring
Covers recommendations for configuring AWS monitoring features.
Targets
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
- 5.01 - Ensure unauthorized API calls are monitored
- 5.02 - Ensure management console sign-in without MFA is monitored
- 5.03 - Ensure usage of the 'root' account is monitored
- 5.04 - Ensure IAM policy changes are monitored
- 5.05 - Ensure CloudTrail configuration changes are monitored
- 5.06 - Ensure AWS Management Console authentication failures are monitored
- 5.07 - Ensure disabling or scheduled deletion of customer created CMKs is monitored
- 5.08 - Ensure S3 bucket policy changes are monitored
- 5.09 - Ensure AWS Config configuration changes are monitored
- 5.10 - Ensure security group changes are monitored
- 5.11 - Ensure Network Access Control List (NACL) changes are monitored
- 5.12 - Ensure changes to network gateways are monitored
- 5.13 - Ensure route table changes are monitored
- 5.14 - Ensure VPC changes are monitored
- 5.15 - Ensure AWS Organizations changes are monitored
- 5.16 - Ensure AWS Security Hub is enabled
- Maximum Attestation Duration
Controls
Setting this policy configures these controls:
- AWS > CIS v6.0 > 5 - Monitoring > 5.01 - Ensure unauthorized API calls are monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.02 - Ensure management console sign-in without MFA is monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.03 - Ensure usage of the 'root' account is monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.04 - Ensure IAM policy changes are monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.05 - Ensure CloudTrail configuration changes are monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.06 - Ensure AWS Management Console authentication failures are monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.07 - Ensure disabling or scheduled deletion of customer created CMKs is monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.08 - Ensure S3 bucket policy changes are monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.09 - Ensure AWS Config configuration changes are monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.10 - Ensure security group changes are monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.11 - Ensure Network Access Control List (NACL) changes are monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.12 - Ensure changes to network gateways are monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.13 - Ensure route table changes are monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.14 - Ensure VPC changes are monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.15 - Ensure AWS Organizations changes are monitored
- AWS > CIS v6.0 > 5 - Monitoring > 5.16 - Ensure AWS Security Hub is enabled
Policy Specification
Schema Type | |
|---|---|
Default | |
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/cis
- tmod:@turbot/aws-cisv6-0#/policy/types/s05
- turbot graphql policy-type --id "tmod:@turbot/aws-cisv6-0#/policy/types/s05"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-cisv6-0#/policy/types/s05"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI