This rule requires the presence of a log metric filter and alarm for monitoring AWS Organizations changes.
Rule | Ensure a log metric filter and alarm exists for AWS Organizations changes |
Framework | cis_v150 |
Severity | ✔ Low |
Rule Description:
This rule ensures that a log metric filter and an alarm exist for AWS Organizations changes in your AWS environment. This is in compliance with the CIS AWS Foundations Benchmark version 1.5.0 (cis_v150), which helps maintain the security and compliance of your AWS resources.
Troubleshooting Steps:
If you encounter any issues with the log metric filter and alarm for AWS Organizations changes, follow these troubleshooting steps:
Verify IAM permissions: Ensure that the user or role executing the steps below has the necessary permissions to create and manage log metric filters and alarms.
Check CloudTrail configuration: Make sure that CloudTrail is enabled in the AWS region where your resources are located. Additionally, verify the CloudTrail configuration to ensure it captures AWS Organizations changes adequately.
Review log metric filter pattern: Double-check the log metric filter pattern to ensure it correctly filters for AWS Organizations changes. Ensure that the filter matches the desired log events and excludes any irrelevant events.
Review alarm threshold: Verify the alarm threshold settings to ensure they are appropriately defined. Check if the condition for triggering the alarm is set correctly based on your security and compliance requirements.
Validate alarm actions: Ensure the configured alarm actions are appropriate and will notify the relevant stakeholders promptly in case of triggered alarms.
Necessary Code:
No code is necessary for this rule. However, you will need to make use of the AWS Management Console and the AWS Command Line Interface (CLI) to implement the required log metric filter and alarm.
Step-by-Step Guide:
Follow these steps to ensure the log metric filter and alarm exist for AWS Organizations changes:
1. Access AWS CloudTrail:
2. Verify CloudTrail Configuration:
3. Create a Log Metric Filter:
4. Configure the Log Metric Filter:
5. Create an Alarm:
6. Review and Finalize:
Following these steps will ensure that you have a log metric filter and alarm in place to capture and respond to AWS Organizations changes according to the requirements of the CIS AWS Foundations Benchmark version 1.5.0 (cis_v150).