Benchmark: SI-4(5) System-Generated Alerts
Description
The information system alerts organization-defined personnel or roles when the following indications of compromise or potential compromise occur: [Assignment: organization-defined compromise indicators].
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-aws-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select SI-4(5) System-Generated Alerts.
Run this benchmark in your terminal:
powerpipe benchmark run aws_compliance.benchmark.nist_800_53_rev_4_si_4_5
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run aws_compliance.benchmark.nist_800_53_rev_4_si_4_5 --share
Controls
- CloudTrail trails should be integrated with CloudWatch logs
- CloudWatch alarm should have an action configured
- GuardDuty should be enabled
- AWS Security Hub should be enabled for an AWS Account