Ensure CloudWatch monitors AWS Management Console authentication requests that are not protected by Multi-Factor Authentication (MFA).
This rule can help you with the following compliance standards:
- CISAWSF
- PCI
- GDPR
- APRA
- MAS
- NIST4
For further details on compliance standards supported by Conformity, see here.
This rule can help you work with the AWS Well-Architected Framework.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
Using CloudWatch alarms to monitor single-factor authentication requests will increase visibility into your AWS accounts that are not protected by Multi-Factor Authentication.
Note: For this rule, Cloud Conformity assumes that the CloudTrail service is already enabled to stream event log data to CloudWatch within your AWS account, otherwise see this rule to enable Amazon Cloudtrail – CloudWatch integration.
Audit
To determine if there are any CloudWatch alarms set up to monitor AWS Console sign-in requests made without MFA, perform the following:
Remediation / Resolution
Step 1: Create a Simple Notification Service (SNS) topic and the necessary subscription to send notification alerts whenever the necessary AWS CloudWatch alarm is triggered:
Step 2: Create the required CloudWatch metric filter and the CloudWatch alarm that will fire whenever an AWS Management Console sign-in request made without using MFA is send:
References
- AWS Documentation
- Amazon CloudWatch Concepts
- View Available Metrics
- Creating Amazon CloudWatch Alarms
- Creating CloudWatch Alarms for CloudTrail Events: Additional Examples
- Create a Topic
- Subscribe to a Topic
- AWS Command Line Interface (CLI) Documentation
- cloudwatch
- describe-alarms-for-metric
- put-metric-alarm
- logs
- put-metric-filter
- sns
- create-topic
- subscribe
- confirm-subscription