Profile Applicability:
- Level 1
Description:
This control ensures that AWS CloudTrail log data is monitored for any configuration changes made to Virtual Private Clouds (VPCs). A CloudWatch metric filter and alarm should be created to detect and alert on events that modify VPCs, subnets, route tables, internet gateways, or peering connections. Monitoring these activities helps detect unauthorized or unintentional network configuration changes that could compromise security or disrupt connectivity.
Rationale:
The VPC forms the foundational network layer for AWS resources. Any unauthorized or accidental modification to VPC components can expose services to external threats or disrupt business operations. By setting up a log metric filter and alarm, organizations can promptly identify and respond to suspicious VPC configuration changes, preserving the security and integrity of the network infrastructure.
Impact:
- Positive Impact:Increases visibility into critical network configuration changes.Enables early detection of misconfigurations or unauthorized modifications.Helps ensure compliance with network security and change management policies.
- Negative Impact:Slight increase in CloudWatch monitoring and alerting costs.
Default Value:
By default, AWS does not create a metric filter or alarm for VPC configuration changes. Manual setup is required.
Pre-Requisite:
- CloudTrail must be enabled for all regions.
- CloudTrail logs must be delivered to a CloudWatch Logs group.
- IAM permissions required:
logs:PutMetricFilter
,cloudwatch:PutMetricAlarm
, andcloudwatch:DescribeAlarms
.
Remediation
Test Plan
Using AWS Console:
Sign in to the AWS Management Console.
Navigate to CloudWatch → Logs → Log groups.
Locate the CloudTrail log group (usually named
/aws/cloudtrail/...
).Select Create metric filter.
Enter the following filter pattern to detect VPC configuration changes:
Assign a metric name such as
VPCChangeEvents
.Go to CloudWatch → Alarms → Create alarm.
Create an alarm for the
VPCChangeEvents
metric.Set a threshold (e.g., ≥ 1 occurrence in 5 minutes) and configure SNS notifications to alert the security team.
Save the configuration.
Implementation Plan
Using AWS Console:
- Go to CloudWatch → Logs → Log groups.
- Open the CloudTrail log group.
- Choose Create metric filter and use the following pattern:
- Set Metric Name:
VPCChangeEvents
. - Create an Alarm:
- Metric:
VPCChangeEvents
- Namespace:
CISBenchmark
- Condition: ≥ 1 in 5 minutes
- Actions: Send notification to security team via SNS topic (e.g.,
aws-security-alerts
)
- Metric:
- Save all changes.
Backout Plan
Using AWS Console:
Go to CloudWatch → Alarms.
Select the
VPCChangeEventsAlarm
.Choose Actions → Delete.
Go to Logs → Metric Filters.
Delete the
VPCChangeEvents
filter.