a year ago
Introducing Updated Compliance Rules for AWS CloudTrail Log Metric Filters
As part of our ongoing maintenance and improvement of rules and rule bundles, we are updating rules related to AWS CloudTrail log metric filters. This change will offer a shift towards organization-level CloudTrail configurations, enabling enhanced security and manageability for your resources.
Please be aware that the existing rules will be deprecated in the following bundles:
- AWS FTR version 1.0.0
- CIS Benchmark from version 1.1.0 to 1.5.0
- Organization Rules
- S3 Best Practice version 1.0 and version 1.1
- Stax Foundation Compliance version 1.0
The deprecated rules are as follows:
- Ensure a log metric filter and alarm exist for AWS Config configuration changes,
- Ensure a log metric filter and alarm exist for AWS Management Console authentication failures,
- Ensure a log metric filter and alarm exist for Management Console sign-in without MFA,
- Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL),
- Ensure a log metric filter and alarm exist for changes to network gateways,
- Ensure a log metric filter and alarm exist for CloudTrail configuration changes,
- Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer-created CMKs,
- Ensure a log metric filter and alarm exist for IAM policy changes,
- Ensure a log metric filter and alarm exist for route table changes,
- Ensure a log metric filter and alarm exist for S3 bucket policy changes,
- Ensure a log metric filter and alarm exist for security group changes,
- Ensure a log metric filter and alarm exist for unauthorized API calls,
- Ensure a log metric filter and alarm exist for usage of root user credentials,
- Ensure a log metric filter and alarm exist for VPC changes
The newly introduced rules will take their place with the following rule names respectively:
- CloudTrail should have a log metric filter for AWS Config changes,
- CloudTrail should have a log metric filter for Console authentication failures,
- CloudTrail should have a log metric filter for Console sign-in without MFA,
- CloudTrail should have a log metric filter for NACL changes,
- CloudTrail should have a log metric filter for Network Gateway changes,
- CloudTrail should have a log metric filter for CloudTrail configuration changes,
- CloudTrail should have a log metric filter for scheduled deletion of customer-created CMKs,
- CloudTrail should have a log metric filter for IAM policy changes,
- CloudTrail should have a log metric filter for route table changes,
- CloudTrail should have a log metric filter for s3 bucket policy changes,
- CloudTrail should have a log metric filter for security group changes,
- CloudTrail should have a log metric filter for unauthorized API calls,
- CloudTrail should have a log metric filter for root user credentials,
- CloudTrail should have a log metric filter for VPC changes
Please note that the check history for the deprecated rules will not be kept.
If you have any questions about this change and what it means for you, please contact support.