This rule ensures the presence of a log metric filter and alarm for AWS Config configuration changes.
Rule | Ensure a log metric filter and alarm exist for AWS Config configuration changes |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Low |
Rule Description
This rule ensures that a log metric filter and alarm are in place to monitor and alert on configuration changes in AWS Config, specifically following the NIST Cybersecurity Framework (CSF) v1 guidelines. By implementing this rule, you can enhance the security of your AWS infrastructure and proactively detect any unauthorized or unexpected configuration modifications.
Troubleshooting Steps
If you encounter any issues with the log metric filter and alarm for AWS Config configuration changes, follow these troubleshooting steps:
Code
The following code snippets demonstrate the necessary configurations to implement the log metric filter and alarm for AWS Config configuration changes in accordance with the NIST CSF v1:
Log Metric Filter
Create a log metric filter to capture AWS Config configuration changes:
aws logs put-metric-filter \ --log-group-name <log-group-name> \ --filter-name "AWSConfigChangesFilter" \ --metric-transformations \ metricName=ConfigChanges,metricNamespace=ConfigChangesNamespace,metricValue=1 \ --filter-pattern '[version = "1.0", ruleId, changedProperties, changeType = "ConfigurationItemChange"]'
Note: Replace
<log-group-name>
with the actual name of your CloudWatch log group.Alarm
Create an alarm to trigger based on the log metric filter:
aws cloudwatch put-metric-alarm \ --alarm-name "AWSConfigChangesAlarm" \ --alarm-description "Alarm for AWS Config configuration changes" \ --metric-name ConfigChanges \ --namespace ConfigChangesNamespace \ --statistic Sum \ --period 300 \ --evaluation-periods 1 \ --threshold 1 \ --comparison-operator GreaterThanOrEqualToThreshold \ --alarm-actions <SNS-topic-ARN> \ --dimensions Name=logGroupName,Value=<log-group-name>
Note: Replace
<SNS-topic-ARN>
with the ARN of the SNS topic to which the alarm should send notifications, and <log-group-name>
with the actual name of your CloudWatch log group.Remediation Steps
In order to remediate any identified issues or non-compliance with the rule, follow these step-by-step guidelines:
<log-group-name>
with the appropriate log group name.<SNS-topic-ARN>
with the desired SNS topic ARN for receiving notifications, and <log-group-name>
with the corresponding log group name.By following these steps, you can successfully implement and maintain a log metric filter and alarm for AWS Config configuration changes, aligning with the NIST CSF v1 guidelines.