Profile Applicability:
- Level 1
Description:
This control ensures that AWS CloudTrail log data is monitored for any configuration changes made to CloudTrail itself. A CloudWatch metric filter and alarm must be created to detect and alert on such events. Monitoring CloudTrail configuration changes helps maintain the integrity of audit logging and ensures continuous visibility into account activity.
Rationale:
CloudTrail provides critical audit logs for all account activities. Unauthorized modification or deletion of CloudTrail trails can result in loss of audit data, hindering the ability to detect and investigate security incidents. By monitoring for configuration changes, organizations can promptly detect attempts to disable or alter CloudTrail, ensuring continuous compliance and accountability.
Impact:
- Positive Impact: Ensures the integrity and continuity of audit logging. Provides immediate visibility into unauthorized attempts to modify CloudTrail settings. Enhances compliance readiness by maintaining complete audit records.
- Negative Impact: Minimal increase in CloudWatch costs for log processing and metric storage.
Default Value:
By default, AWS does not provide a metric filter or alarm for CloudTrail configuration changes. Manual configuration is required.
Pre-Requisite:
- CloudTrail must be enabled in all regions.
- CloudTrail logs must be delivered to a CloudWatch Logs group.
- IAM permissions required:
logs:PutMetricFilter
,cloudwatch:PutMetricAlarm
, andcloudwatch:DescribeAlarms
.
Remediation
Test Plan
Using AWS Console:
- Sign in to the AWS Management Console.
- Navigate to CloudWatch → Logs → Log groups.
- Locate the CloudTrail log group (typically named
/aws/cloudtrail/...
). - Select Create metric filter.
- Enter the following filter pattern to detect CloudTrail configuration changes:
- Assign a metric name such as
CloudTrailConfigChanges
. - Go to CloudWatch → Alarms → Create alarm.
- Create an alarm for the
CloudTrailConfigChanges
metric. - Set a threshold (e.g., >= 1 occurrence within 5 minutes) and configure SNS notifications to alert the security team.
- Save the configuration.
Implementation Plan
Using AWS Console:
- Go to CloudWatch → Logs → Log groups.
- Open the CloudTrail log group.
- Choose Create metric filter .
- Set Metric Name:
CloudTrailConfigChanges
. - Create an Alarm:
- Metric:
CloudTrailConfigChanges
- Namespace:
CISBenchmark
- Condition: ≥ 1 in 5 minutes
- Actions: Send notification to security team via SNS topic (e.g.,
aws-security-alerts
)
- Metric:
- Save all changes.
Backout Plan
Using AWS Console:
Go to CloudWatch → Alarms.
Select the
CloudTrailConfigChangesAlarm
.Choose Actions → Delete.
Go to Logs → Metric Filters.
Delete the
CloudTrailConfigChanges
filter.