Amazon_CloudWatch_11

Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)

Description

Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs and establishing corresponding metric filters and alarms. NACLs are used as a stateless packet filter to control ingress and egress traffic for subnets within a VPC. It is recommended that a metric filter and alarm be established for changes made to NACLs.

Remediation

Perform the following to ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)

Note : Filter pattern for changes to Network Access Control Lists (NACL)

filterPattern”: “{ ($.eventName = CreateNetworkAcl) || ($.eventName =
CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName =
DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName =
ReplaceNetworkAclAssociation) }”

Perform the following to setup the metric filter, alarm, SNS topic, and subscription:

  1. Identify the log group name configured for use with CloudTrail
  2. Note the &lt

Service

CloudWatch

Severity

Medium

Compliance

Mapping

We are now live on AWS Marketplace.
The integrated view of your cloud infrastructure is now easier than ever!