Amazon CloudWatch is a monitoring and observability service built for DevOps engineers, developers, site reliability engineers (SREs), and IT managers. CloudWatch provides you with data and actionable insights to monitor your applications, respond to system-wide performance changes, optimize resource utilization, and get a unified view of operational health. CloudWatch collects monitoring and operational data in the form of logs, metrics, and events, providing you with a unified view of AWS resources, applications, and services that run on AWS and on-premises servers. You can use CloudWatch to detect anomalous behavior in your environments, set alarms, visualize logs and metrics side by side, take automated actions, troubleshoot issues, and discover insights to keep your applications running smoothly.
Ensure that CloudWatch has an alarm set on CloudTrail log for any unauthorized API calls.
Ensure that CloudWatch has an alarm set on CloudTrail log for any user that has been able to authenticate to the AWS console without multi factor authentication.
Ensure that CloudWatch has an alarm set on CloudTrail log for any activity of the root account logging into the console.
Ensure that CloudWatch has an alarm set on CloudTrail log for any IAM User changes.
Ensure that CloudWatch has an alarm set on CloudTrail log for any IAM Role changes.
Ensure that CloudWatch has an alarm set on CloudTrail log for any IAM Group changes.
Ensure that CloudWatch has an alarm set on CloudTrail log for any IAM Policy changes.
Ensure that CloudWatch has an alarm set on CloudTrail configuration changes.
Ensure that CloudWatch has an alarm set for login failures.
Ensure that CloudWatch has an alarm set for Customer Manged Keys (CMK) being disabled in the Key Management Service (KMS).
Ensure that CloudWatch has an alarm set for changes to S3 bucket policies.
Ensure that CloudWatch has an alarm set for changes to the Config Service.
Ensure that CloudWatch has an alarm set for changes to Security Group changes.
Ensure that CloudWatch has an alarm set for Network Access Control List (ACL) changes.
Are you curious as to what type of data Intelligent Discovery collects in relation to AWS vulnerabilities?
Login into our on-line demo to see a simulated view of what Intelligent Discovery collects and explains how to remediate.
demo.intelligentdiscovery.io
Consolidate your inventory management with consistent and frequent security logs, inventories, and change logs. Dashboard reporting for extensive analytical value.
learn more +Access consolidated capacity, cost, and volume tools in a scaling environment without impacting production or breaking the bank.
learn more +