Usecase Universe

A collective of use cases for DevOps teams

Browse a variety of 300+ predefined templates to automate all your AWS actions

Create Template
Solutions
All Categories

CloudWatch

24 Times Used
22 MAY 2019
Notifies if the Amazon CloudWatch default event bus created within your account allows unknown cross-account event delivery.
CloudWatch
Security
Security
AWS Best Practices

An AWS CloudWatch event bus is a feature that facilitates AWS accounts to share events with each other.Amazon CloudWatch event buses are configured to allow access only to friendly AWS accounts in order to prevent unauthorized users from sharing their CloudWatch events. This is AWS best Paractice to notifiy if the Amazon CloudWatch default event bus created within your account allows unknown cross-account event delivery.

Notify if Cloudwatch event bus allows access to everyone(*).
CloudWatch
Security
AWS Best Practices
Security

An AWS CloudWatch default event bus is a feature that facilitates AWS accounts to share events with each other. This is template notify if your CloudWatch default event bus available within your AWS account allows access to everyone (*). This is AWS best practice to allow only the authorized users to send their events data by managing the permissions defined for the default event bus.

Ensure a log metric filter and alarm exist for Management Console sign-in without MFA
CloudWatch
CIS-AWS

Checks for log metric filter and Management Console sign-in without MFA alarm in your aws account.

Ensure a log metric filter and alarm exist for AWS Config configuration changes - fix
CloudWatch
Operational Excellence

.

Ensure a log metric filter and alarm exist for AWS Management Console authentication failures - fix
CloudWatch
Operational Excellence

.

Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) - fix
CloudWatch
Operational Excellence

.

Ensure a log metric filter and alarm exist for changes to network gateways - fix
CloudWatch
Operational Excellence

.

Ensure a log metric filter and alarm exist for CloudTrail configuration changes - fix
CloudWatch
Operational Excellence

.

Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs - fix
CloudWatch
Operational Excellence

.

Ensure a log metric filter and alarm exist for IAM policy changes - fix
CloudWatch
Operational Excellence

.

Ensure a log metric filter and alarm exist for Management Console sign-in without MFA - fix
CloudWatch
Operational Excellence

.

Ensure a log metric filter and alarm exist for route table changes - fix
Operational Excellence
CloudWatch

.

Ensure a log metric filter and alarm exist for S3 bucket policy changes - fix
CloudWatch
Operational Excellence

.

Ensure a log metric filter and alarm exist for security group changes - fix
Operational Excellence
CloudWatch

.

Ensure a log metric filter and alarm exist for unauthorized API calls - fix
CloudWatch
Operational Excellence

.