Get Involved
Query: Ensure a log metric filter and alarm exist for IAM policy changes
Description
You can do real-time monitoring of API calls by directing CloudTrail logs to CloudWatch Logs and establishing corresponding metric filters and alarms. Security Hub recommends that you create a metric filter and alarm for changes made to IAM policies. Monitoring these changes helps ensure that authentication and authorization controls remain intact.
Query
Tables used in this query:
- aws_account
- aws_cloudtrail_trail
- aws_cloudwatch_alarm
- aws_cloudwatch_log_metric_filter
- aws_sns_topic_subscription
Controls using this query:
- 3.4 Ensure a log metric filter and alarm exist for IAM policy changes
- 4.4 Ensure a log metric filter and alarm exist for IAM policy changes
- 4.4 Ensure a log metric filter and alarm exist for IAM policy changes
- 4.4 Ensure a log metric filter and alarm exist for IAM policy changes
- 4.4 Ensure IAM policy changes are monitored
- 4.4 Ensure IAM policy changes are monitored
- 4.4 Ensure IAM policy changes are monitored
- 4.4 Ensure IAM policy changes are monitored
- Ensure a log metric filter and alarm exist for IAM policy changes