This rule ensures CloudWatch alarm action is enabled to effectively monitor system and information integrity.
Rule | CloudWatch alarm action should be enabled |
Framework | FedRAMP Moderate Revision 4 |
Severity | ✔ High |
Ensuring CloudWatch Alarm Actions are Enabled for FedRAMP Moderate Revision 4
Overview
FedRAMP (Federal Risk and Authorization Management Program) Moderate Revision 4 encompasses a set of security controls designed for cloud services used by the US federal government. The controls aim to safeguard and manage risk in the federal cloud computing landscape. One applicable security control mandates that monitoring systems, like AWS CloudWatch, should have alarm actions enabled to notify administrators of potential security concerns or operational issues promptly.
Rule Details
The specific rule in question requires that AWS CloudWatch alarms be configured with corresponding actions. These actions can include notifications sent to an SNS topic, auto-scaling policy execution, or EC2 instance reboot/termination. The key purpose is to ensure that in case of any anomalous behavior or predefined thresholds being breached, stakeholders are immediately alerted, and where appropriate, automated remediation is triggered.
Troubleshooting Steps
If the CloudWatch alarm action is not enabled, follow these steps to resolve the issue:
Step 1: Verify CloudWatch Alarm Configuration
Step 2: Configure Alarm Action if Missing
Step 3: Verify SNS Topic Subscription
Necessary CLI Commands
To verify and configure CloudWatch alarm actions via the AWS CLI, you can use the following commands:
# List all CloudWatch alarms aws cloudwatch describe-alarms # Put an alarm action aws cloudwatch put-metric-alarm --alarm-name "your-alarm-name" --metric-name "your-metric" --namespace "AWS/EC2" --statistic Average --period 300 --threshold 80 --comparison-operator GreaterThanThreshold --evaluation-periods 2 --alarm-actions arn:aws:sns:your-region:your-account-id:your-sns-topic --unit Percent # Subscribe an email endpoint to an SNS topic aws sns subscribe --topic-arn arn:aws:sns:your-region:your-account-id:your-sns-topic --protocol email --notification-endpoint your-email@example.com
Remediation Guide
Upon verifying that a CloudWatch alarm lacks the required actions, proceed with the following steps to remediate the deficiency:
SEO Friendly Summary
For compliance with FedRAMP Moderate Revision 4, it's critical to maintain active monitoring and rapid response mechanisms by ensuring that your AWS CloudWatch alarms are appropriately configured with alarm actions. This guide provides a detailed walkthrough on assessing your current alarm configurations, troubleshooting issues related to notification actions, and steps for remediation using the AWS Management Console and AWS CLI, yielding a compliant and secure cloud environment.