Policy: AWS > Well-Architected Tool > AWS Well-Architected Framework > Security > SEC 04. How do you detect and investigate security events? > Implement actionable security events
Create alerts that are sent to and can be actioned by your team. Ensure that alerts include relevant information for the team to take action. For example, ensure that Amazon GuardDuty and AWS Security Hub alerts are sent to the team to action, or sent to response automation tooling with the team remaining informed by messaging from the automation framework.
See Implement actionable security events for more information.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
- AWS > Well-Architected Tool > AWS Well-Architected Framework > Security
- AWS > Well-Architected Tool > AWS Well-Architected Framework > Security > SEC 04. How do you detect and investigate security events?
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/other
- tmod:@turbot/aws-wellarchitected-framework#/policy/types/sec04ActionableEvents
- turbot graphql policy-type --id "tmod:@turbot/aws-wellarchitected-framework#/policy/types/sec04ActionableEvents"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-wellarchitected-framework#/policy/types/sec04ActionableEvents"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI