turbot/steampipe-mod-aws-compliance

Benchmark: A3.5.1: A methodology is implemented for the prompt identification of attack patterns and undesirable behavior across systems

Description

The ability to identify attack patterns and undesirable behavior across systems—for example, using centrally managed or automated log-correlation tools— is critical in preventing, detecting, or minimizing the impact of a data compromise. The presence of logs in all environments allows thorough tracking, alerting, and analysis when something goes wrong.

Usage

Install the mod:

mkdir dashboards
cd dashboards
powerpipe mod init
powerpipe mod install github.com/turbot/steampipe-mod-aws-compliance

Start the Powerpipe server:

steampipe service start
powerpipe server

Open http://localhost:9033 in your browser and select A3.5.1: A methodology is implemented for the prompt identification of attack patterns and undesirable behavior across systems.

Run this benchmark in your terminal:

powerpipe benchmark run aws_compliance.benchmark.pci_dss_v40_appendix_a3_5_1

Snapshot and share results via Turbot Pipes:

powerpipe benchmark run aws_compliance.benchmark.pci_dss_v40_appendix_a3_5_1 --share

Controls

Tags