Using Change Management Logs

Information

By managing security logs, you can also track changes. These might include planned changes, which are part of the organization's change control process (sometimes referred to as MACD-Move/Add/Change/Delete), ad hoc changes, or unexpected changes, such as incidents.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

All logs for system components must be reviewed at the minimum on a daily basis. Log reviews must include those servers that perform security functions, such as intrusion-detection system (IDS) and authentication, authorization, and accounting protocol (AAA) servers (for example, RADIUS). To facilitate this process, you can use log harvesting, parsing, and alerting tools.

See Also

https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf

Item Details

Category: SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, PLANNING, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|CA-1, 800-53|CA-6, 800-53|CA-7, 800-53|CM-2, 800-53|CM-3, 800-53|CM-5, 800-53|CM-6, 800-53|CM-9, 800-53|PL-2, 800-53|PL-5, 800-53|SI-2, 800-53|SI-6, 800-53|SI-7

Plugin: amazon_aws

Control ID: cd2a835485e9922f025a291ac1d218d82a03f4dfab2a283a3a4ea6d7e3d33339