Home Tags AWS CloudWatch Logs

Tag: AWS CloudWatch Logs

Are you monitoring Security Group changes? If not, know how

Security Group is the firewall of your cloud infrastructure. It provides security to your instances, applications and resources at protocol and port access levels....

CloudWatch Alarms for Failed Login Attempts

The core of an organization's strategy is innovation. But, the rapid growth of technology and intense competition has put organizations in a hustle to...

Ensure your IAM Policies are not vulnerable to alteration

As a root user, you always want to have full governance over your AWS infrastructure. If any change occurs into your configuration, you should...

Route Table monitoring using CloudTrail and CloudWatch

Route Table is a channel which contains a set of rules to determine where the network traffic is directed. These set of rules are...

Exposed S3 bucket CloudTrail logs — Another way to compromise security

Why security of S3 bucket is a must? In the configuration of CloudTrail and CloudWatch, you need an S3 bucket to store all your logs...

Network Address Translation (NAT) Gateway – Manage & Monitor it

Network Address Translation (NAT) is the gateway which is used to connect instances in your private subnet to the internet or any other AWS...

Virtual Private Network (VPN) – How to track configuration changes

AWS Virtual Private Cloud (VPC) is a commercial cloud-based service for enterprise customers who prefer to run their workloads in the private cloud. It...

Amazon CloudTrail integration into CloudWatch is a security best practice

Amazon CloudTrail and CloudWatch are two security pillars of your cloud. Majorly they must maintain logs, create metrics of sign-ins and notify the subscribed...

Enabling AWS Config monitoring and alarms

What is AWS Config? AWS Config is a service that allows you to evaluate, audit and assess your AWS resources. Through AWS Config, you can...

How to track sign-ins without MFA (Multi-Factor Authentication)

In the 21st century, the era of mobilization and the internet, we are always in search of new ways to secure our privacy and...