Ensure CloudWatch monitors AWS Management Console authentication requests that are not protected by Multi-Factor Authentication (MFA).
This rule can help you with the following compliance standards:
- CISAWSF
- PCI
- GDPR
- APRA
- MAS
- NIST4
For further details on compliance standards supported by TrendAI Vision One™ Cloud Risk Management, see here.
This rule can help you work with the AWS Well-Architected Framework.
Using CloudWatch alarms to monitor single-factor authentication requests will increase visibility into your AWS accounts that are not protected by Multi-Factor Authentication.
Note: For this rule, TrendAI Vision One™ Cloud Risk Management assumes that the CloudTrail service is already enabled to stream event log data to CloudWatch within your AWS account, otherwise see this rule to enable Amazon Cloudtrail – CloudWatch integration.
Audit
To determine if there are any CloudWatch alarms set up to monitor AWS Console sign-in requests made without MFA, perform the following:
Remediation / Resolution
Step 1: Create a Simple Notification Service (SNS) topic and the necessary subscription to send notification alerts whenever the necessary AWS CloudWatch alarm is triggered:
Step 2: Create the required CloudWatch metric filter and the CloudWatch alarm that will fire whenever an AWS Management Console sign-in request made without using MFA is send:
References
- AWS Documentation
- Amazon CloudWatch Concepts
- View Available Metrics
- Creating Amazon CloudWatch Alarms
- Creating CloudWatch Alarms for CloudTrail Events: Additional Examples
- Create a Topic
- Subscribe to a Topic
- AWS Command Line Interface (CLI) Documentation
- cloudwatch
- describe-alarms-for-metric
- put-metric-alarm
- logs
- put-metric-filter
- sns
- create-topic
- subscribe
- confirm-subscription