Get Involved
Query: Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)
Description
You can do real-time monitoring of API calls by directing CloudTrail logs to CloudWatch Logs and establishing corresponding metric filters and alarms. NACLs are used as a stateless packet filter to control ingress and egress traffic for subnets in a VPC. Security Hub recommends that you create a metric filter and alarm for changes to NACLs. Monitoring these changes helps ensure that AWS resources and services aren't unintentionally exposed.
Query
Tables used in this query:
- aws_account
- aws_cloudtrail_trail
- aws_cloudwatch_alarm
- aws_cloudwatch_log_metric_filter
- aws_sns_topic_subscription
Controls using this query:
- 3.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)
- 4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)
- 4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)
- 4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)
- 4.11 Ensure Network Access Control List (NACL) changes are monitored
- 4.11 Ensure Network Access Control List (NACL) changes are monitored
- 4.11 Ensure Network Access Control Lists (NACL) changes are monitored
- 4.11 Ensure Network Access Control Lists (NACL) changes are monitored
- Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)