Profile Applicability:
- Level 1
Description:
This control ensures that AWS CloudTrail logs are continuously monitored for any changes to Network Access Control Lists (NACLs). By configuring a CloudWatch metric filter and corresponding alarm, organizations can detect and respond to unauthorized, accidental, or unexpected modifications to NACL configurations, which may affect the security of network traffic flow within a VPC.
Rationale:
NACLs act as virtual firewalls controlling inbound and outbound traffic at the subnet level. Any change to NACL configurations — such as adding, deleting, or modifying rules — can expose systems to potential network-based attacks or service disruptions. Monitoring NACL change events helps identify unauthorized or unplanned modifications in real-time, enabling prompt investigation and mitigation.
Impact:
- Positive Impact:Improves visibility into network boundary changes and strengthens overall security posture by ensuring timely alerts for any unauthorized NACL changes.
- Negative Impact:
Minor additional costs associated with CloudWatch metric storage, alarms, and SNS notifications.
Default Value:
By default, AWS does not create a CloudWatch metric filter or alarm for NACL changes. Manual configuration is required.
Pre-Requisites:
AWS CloudTrail must be enabled across all regions.
CloudTrail logs must be delivered to a CloudWatch Logs group.
Required IAM permissions:
logs:PutMetricFiltercloudwatch:PutMetricAlarmcloudwatch:DescribeAlarms
Remediation
Test Plan
Using AWS Console:
- Sign in to the AWS Management Console.
- Navigate to CloudWatch → Logs → Log groups.
- Locate the CloudTrail log group (e.g.,
/aws/cloudtrail/...). - Choose Create metric filter.
- Enter the following filter pattern to capture all NACL modification events:
- Assign a metric name, e.g., NACLChanges.
- Navigate to CloudWatch → Alarms → Create alarm.
- Select the metric NACLChanges under the namespace CISBenchmark.
- Configure the threshold condition (e.g., ≥ 1 occurrence within 5 minutes).
- Set Actions to notify the security team via SNS (e.g.,
aws-security-alerts). - Save the configuration and simulate a NACL change to verify alert functionality.
Implementation Plan
Using AWS Console:
- Go to CloudWatch → Logs → Log groups.
- Select your CloudTrail log group.
- Click Create metric filter.
- Use the following filter pattern:
- Set Metric Name: NACLChanges
- Set Metric Namespace: CISBenchmark
- Go to CloudWatch → Alarms → Create alarm.
- Select the NACLChanges metric.
- Configure Condition: ≥ 1 event in 5 minutes.
- Under Actions, select Send notification to the SNS topic (e.g.,
aws-security-alerts). - Review and create the alarm.
Backout Plan
Using AWS Console:
Navigate to CloudWatch → Alarms.
Locate and select the NACLChangesAlarm.
Choose Actions → Delete.
Navigate to CloudWatch → Logs → Metric Filters.
Delete the NACL changes metric filter.