github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/avd_docs/aws/cloudwatch/AVD-AWS-0154/docs.md (about) 1 2 You can do real-time monitoring of API calls by directing CloudTrail logs to CloudWatch Logs and establishing corresponding metric filters and alarms. 3 4 CIS recommends that you create a metric filter and alarm for changes to S3 bucket policies. Monitoring these changes might reduce time to detect and correct permissive policies on sensitive S3 buckets. 5 6 ### Impact 7 Misconfigured policies on S3 buckets could lead to data leakage, without alerting visibility of this is reduced. 8 9 <!-- DO NOT CHANGE --> 10 {{ remediationActions }} 11 12 ### Links 13 - https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html 14 15