Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
44 changes: 22 additions & 22 deletions reference-artifacts/SAMPLE_CONFIGS/config.lite-CTNFW-example.json
Original file line number Diff line number Diff line change
Expand Up @@ -249,7 +249,7 @@
"metrics": [
{
"filter-name": "SecurityGroupChangeMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ ($.eventName = AuthorizeSecurityGroupIngress) || ($.eventName = AuthorizeSecurityGroupEgress) || ($.eventName = RevokeSecurityGroupIngress) || ($.eventName = RevokeSecurityGroupEgress) || ($.eventName = CreateSecurityGroup) || ($.eventName = DeleteSecurityGroup) }",
Expand All @@ -259,7 +259,7 @@
},
{
"filter-name": "NetworkAclChangeMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation)}",
Expand All @@ -269,7 +269,7 @@
},
{
"filter-name": "GatewayChangeMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ ($.eventName = CreateCustomerGateway) || ($.eventName = DeleteCustomerGateway) || ($.eventName = AttachInternetGateway) || ($.eventName = CreateInternetGateway) || ($.eventName = DeleteInternetGateway) || ($.eventName = DetachInternetGateway)}",
Expand All @@ -279,7 +279,7 @@
},
{
"filter-name": "VpcChangeMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) }",
Expand All @@ -289,7 +289,7 @@
},
{
"filter-name": "Ec2InstanceChangeMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ ($.eventName = RunInstances) || ($.eventName = RebootInstances)|| ($.eventName = StartInstances) || ($.eventName = StopInstances) || ($.eventName= TerminateInstances) }",
Expand All @@ -299,7 +299,7 @@
},
{
"filter-name": "Ec2LargeInstanceChangeMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ (($.eventName = RunInstances) || ($.eventName = RebootInstances)|| ($.eventName = StartInstances) || ($.eventName = StopInstances) || ($.eventName= TerminateInstances)) && (($.requestParameters.instanceType= *.32xlarge) || ($.requestParameters.instanceType= *.24xlarge) || ($.requestParameters.instanceType= *.18xlarge) || ($.requestParameters.instanceType= *.16xlarge) || ($.requestParameters.instanceType= *.12xlarge) || ($.requestParameters.instanceType= *.10xlarge) || ($.requestParameters.instanceType= *.9xlarge) || ($.requestParameters.instanceType= *.8xlarge) || ($.requestParameters.instanceType = *.4xlarge)) }",
Expand All @@ -309,7 +309,7 @@
},
{
"filter-name": "CloudTrailChangeMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ ($.eventName = CreateTrail) || ($.eventName = UpdateTrail)|| ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName= StopLogging) }",
Expand All @@ -319,7 +319,7 @@
},
{
"filter-name": "ConsoleSignInFailureMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ ($.eventName = ConsoleLogin) && ($.errorMessage = \"Failed authentication\") }",
Expand All @@ -329,7 +329,7 @@
},
{
"filter-name": "AuthorizationFailureMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ (($.errorCode = \"*UnauthorizedOperation\") || ($.errorCode =\"AccessDenied*\") && ($.userIdentity.principalId != \"*AWSConfig-BucketConfigCheck\")) }",
Expand All @@ -339,7 +339,7 @@
},
{
"filter-name": "IamPolicyChangesMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{($.eventName=DeleteGroupPolicy)||($.eventName=DeleteRolePolicy)||($.eventName=DeleteUserPolicy)||($.eventName=PutGroupPolicy)||($.eventName=PutRolePolicy)||($.eventName=PutUserPolicy)||($.eventName=CreatePolicy)||($.eventName=DeletePolicy)||($.eventName=CreatePolicyVersion)||($.eventName=DeletePolicyVersion)||($.eventName=AttachRolePolicy)||($.eventName=DetachRolePolicy)||($.eventName=AttachUserPolicy)||($.eventName=DetachUserPolicy)||($.eventName=AttachGroupPolicy)||($.eventName=DetachGroupPolicy)}",
Expand All @@ -349,7 +349,7 @@
},
{
"filter-name": "ConsoleSignInWithoutMfaMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{($.eventName=\"ConsoleLogin\") && ($.additionalEventData.MFAUsed !=\"Yes\") && ($.userIdentity.type != \"AssumedRole\")}",
Expand All @@ -359,7 +359,7 @@
},
{
"filter-name": "RootLoginMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ $.userIdentity.type = \"Root\" && $.userIdentity.invokedBy NOT EXISTS && $.eventType != \"AwsServiceEvent\" }",
Expand All @@ -369,7 +369,7 @@
},
{
"filter-name": "DisableOrDeleteCMKMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{($.eventSource=kms.amazonaws.com) && (($.eventName=DisableKey) || ($.eventName=ScheduleKeyDeletion))}",
Expand All @@ -379,7 +379,7 @@
},
{
"filter-name": "AWSConfigChangesMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{($.eventSource=config.amazonaws.com) && (($.eventName=StopConfigurationRecorder) || ($.eventName=DeleteDeliveryChannel) || ($.eventName=PutDeliveryChannel) || ($.eventName=PutConfigurationRecorder))}",
Expand All @@ -389,7 +389,7 @@
},
{
"filter-name": "RouteTableChangesMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{($.eventName=CreateRoute) || ($.eventName=CreateRouteTable) || ($.eventName=ReplaceRoute) || ($.eventName=ReplaceRouteTableAssociation) || ($.eventName=DeleteRouteTable) || ($.eventName=DeleteRoute) || ($.eventName=DisassociateRouteTable)}",
Expand All @@ -399,7 +399,7 @@
},
{
"filter-name": "S3BucketPolicyChangesMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{($.eventSource=s3.amazonaws.com) && (($.eventName=PutBucketAcl) || ($.eventName=PutBucketPolicy) || ($.eventName=PutBucketCors) || ($.eventName=PutBucketLifecycle) || ($.eventName=PutBucketReplication) || ($.eventName=DeleteBucketPolicy) || ($.eventName=DeleteBucketCors) || ($.eventName=DeleteBucketLifecycle) || ($.eventName=DeleteBucketReplication))}",
Expand All @@ -409,7 +409,7 @@
},
{
"filter-name": "SSOAuthUnapprovedIPMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ ($.eventSource=sso.amazonaws.com) && ($.eventName=Authenticate) && ($.sourceIPAddress != ${ALARM-NOT-IP}) }",
Expand All @@ -419,7 +419,7 @@
},
{
"filter-name": "IAMAuthUnapprovedIPMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ ($.eventName=ConsoleLogin) && ($.userIdentity.type=IAMUser) && ($.sourceIPAddress != ${ALARM-NOT-IP}) }",
Expand All @@ -429,7 +429,7 @@
},
{
"filter-name": "UnencryptedFilesystemCreatedMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{ ($.eventName = CreateFileSystem) && ($.responseElements.encrypted IS FALSE) } ",
Expand All @@ -439,7 +439,7 @@
},
{
"filter-name": "IgnoreAuthorizationFailureMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{($.errorCode=\"*UnauthorizedOperation\") || ($.errorCode=\"AccessDenied*\")}",
Expand All @@ -449,7 +449,7 @@
},
{
"filter-name": "IgnoreConsoleSignInWithoutMfaMetric",
"accounts": ["ALL"],
"accounts": ["management"],
"regions": ["${HOME_REGION}"],
"loggroup-name": "aws-controltower/CloudTrailLogs",
"filter-pattern": "{($.eventName=\"ConsoleLogin\") && ($.additionalEventData.MFAUsed !=\"Yes\")}",
Expand All @@ -459,7 +459,7 @@
}
],
"alarms": {
"default-accounts": ["ALL"],
"default-accounts": ["management"],
"default-regions": ["${HOME_REGION}"],
"default-namespace": "CloudTrailMetrics",
"default-statistic": "Sum",
Expand Down