This rule ensures the presence of a log metric filter and alarm for VPC changes.
Rule | Ensure a log metric filter and alarm exist for VPC changes |
Framework | cis_v130 |
Severity | ✔ Low |
Rule Description:
The rule requires the creation of a log metric filter and alarm to be set up for VPC (Virtual Private Cloud) changes in accordance with the Center for Internet Security (CIS) Version 1.3.0 benchmark. This rule helps to monitor and track any modifications made to VPCs, assisting in ensuring the security and compliance of the AWS environment.
Troubleshooting Steps:
Verify VPC Flow Logs:
Confirm Log Metric Filter:
Validate Alarm Configuration:
Verify Event History:
Necessary Codes:
In this case, there is no specific code to be provided as the implementation of log metric filters and alarms might vary depending on the AWS infrastructure and monitoring setup. However, the following steps outline the general procedure for remediation.
Remediation Steps:
Enable VPC Flow Logs:
Create Log Metric Filter:
{ ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) }
Set up an Alarm:
Summary:
By following the above steps, you ensure compliance with the CIS benchmark v1.3.0 by setting up a log metric filter and alarm for VPC changes. This allows you to track any modifications made to VPCs and promptly respond to any unauthorized or unexpected changes. Regularly monitoring the CloudWatch Logs and investigating alarm notifications will help maintain the security and compliance of your AWS environment.