This rule ensures the presence of a log metric filter and alarm for any security group changes.
Rule | Ensure a log metric filter and alarm exist for security group changes |
Framework | cis_v130 |
Severity | ✔ Low |
Rule Description:
The rule requires a log metric filter and alarm to be set up for detecting and monitoring security group changes in compliance with the CIS benchmark version 1.3.0.
Remediation Steps:
To remediate this, you need to perform the following steps:
Log Metric Filter Configuration:
Filter Pattern:
Enter a filter pattern that matches security group changes in the logs.
Filter pattern example:
{($.eventName = AuthorizeSecurityGroupIngress) || ($.eventName = AuthorizeSecurityGroupEgress) || ($.eventName = RevokeSecurityGroupIngress) || ($.eventName = RevokeSecurityGroupEgress)}
Assign Metric:
Alarm Configuration:
Troubleshooting Steps:
If you encounter any issues during the configuration or if the alarm fails to trigger for security group changes, try the following troubleshooting steps:
If the above steps do not resolve the issue, refer to AWS documentation or consult with an AWS expert for further assistance.
Code (if applicable):
There is no specific code required for this rule. The configuration is done through the AWS Management Console using the CloudWatch service.
Additional Notes:
Implementing this log metric filter and alarm will help you detect and respond to security group changes in your AWS environment. It will enhance your overall security posture and compliance with the CIS benchmark. Regularly monitoring these changes can protect your resources from unauthorized access or misconfigurations.