AWS CloudWatch Events Should Be Used
CloudWatch Events should be used to help you respond to operational changes within your AWS resources.
Cloudanix
CloudWatch Events should be used to help you respond to operational changes within your AWS resources.
CloudWatch Events should be used to help you respond to operational changes within your AWS resources.
AWS Config configuration changes should be monitored using CloudWatch alarms.
AWS Console Sign-In Requests Without MFA should be monitored using CloudWatch Events.
Amazon Organizations changes should be monitored using AWS CloudWatch alarms.
Any unauthorized API calls made within your AWS account should be monitored using CloudWatch alarms.
AWS CMK configuration changes should be monitored using CloudWatch alarms.
Aall AWS CloudTrail configuration changes should be monitored using CloudWatch alarms.
Your AWS Console authentication process should be monitored using CloudWatch alarms.
AWS EC2 instance changes should be monitored using CloudWatch alarms.
AWS EC2 large instance changes should be monitored using CloudWatch alarms.
AWS IAM policy configuration changes should be monitored using CloudWatch alarms.
AWS VPC Customer/Internet Gateway configuration changes should be monitored using CloudWatch alarms.
AWS Network ACLs configuration changes should be monitored using CloudWatch alarms.
Root Account Usage should be monitored using CloudWatch alarms.
AWS Route Tables configuration changes should be monitored using CloudWatch alarms.
AWS S3 Buckets configuration changes should be monitored using CloudWatch alarms.
AWS security groups configuration changes should be monitored using CloudWatch alarms.
AWS VPCs configuration changes should be monitored using CloudWatch alarms.
Your AWS CloudWatch event bus should not be exposed to everyone.
AWS CloudWatch event buses should not allow unknown cross-account access for delivery of events.
A CloudWatch alarm should be created for the VPC Flow Logs metric filter and an alarm action should be configured.
A log metric filter for the CloudWatch group assigned to the VPC Flow Logs should be created.
Connect a cloud account in under 30 minutes. See every finding rooted in identity, asset, and blast radius — with a fix path attached.
Book a DemoCLOUDANIX
Explore guides, checklists, and blogs that simplify cloud security and help you secure your infrastructure.
Real-world success stories where Cloudanix helped organizations secure their cloud infrastructure. Watch how we made a difference across ind…
Read Case Studies
Understand what Cloud Security Posture Management (CSPM) is and how it automates security and compliance across cloud environments.
Read moreUnderstand how CASB, CSPM, and SIEM work together to enhance your cloud security posture and ensure better governance.
Read the blogIn-depth assessment of cloud environment for security, compliance, and optimization. Identify vulnerabilities, ensure data protection, and o…
Read the blogCloud environments are getting more complex and dynamic day by day, making it difficult to gain complete visibility into all assets and thei…
Read the blogCloudanix offers you a single dashboard to secure your workloads. Learn how to set up Cloudanix for your cloud platform from our documentati…
Take a lookA complete history of changes, improvements, and fixes for Cloudanix. Subscribe to get notified about the latest updates.
View Changelog