Overview

A CloudWatch Alarm that triggers if there is API activity in the account without MFA (Multi-Factor Authentication).

Prerequisites: This Alarm requires CloudTrail enabled, with events sent to a CloudWatch Log Group. See Related Configuration Items for configuration to enable CloudTrail/CloudWatch, or enter the CloudWatch Log Group name under the Metric Filter Configuration section.

Configuration Templates

Items
3
Size
1.2 KB
Missing Parameters
AWSTemplateFormatVersion: '2010-09-09'
Description: ''
Resources:
  SnsTopic:
    Type: 'AWS::SNS::Topic'
    Properties:
      Subscription:
        - Endpoint: email@example.com
          Protocol: email
      TopicName: alarm-action
  CloudWatchAlarm:
    Type: 'AWS::CloudWatch::Alarm'
    Properties:
      AlarmName: no_mfa_api_activity
      AlarmDescription: >-
        A CloudWatch Alarm that triggers if there is API activity in the account
        without MFA (Multi-Factor Authentication).
      MetricName: ApiActivityWithoutMFACount
      Namespace: CloudTrailMetrics
      Statistic: Sum
      Period: '300'
      EvaluationPeriods: '1'
      Threshold: '1'
      ComparisonOperator: GreaterThanOrEqualToThreshold
      AlarmActions:
        - Ref: SnsTopic
      TreatMissingData: notBreaching
  MetricFilter:
    Type: 'AWS::Logs::MetricFilter'
    Properties:
      LogGroupName: ''
      FilterPattern: '{ $.userIdentity.sessionContext.attributes.mfaAuthenticated != "true" }'
      MetricTransformations:
        - MetricValue: '1'
          MetricNamespace: CloudTrailMetrics
          MetricName: ApiActivityWithoutMFACount
Parameters: {}
Metadata: {}
Conditions: {}

Actions



Customize Cf Template

Configure Action

Metric Filter Configuration


Alarm Configuration

* Required field

Sources and Documentation

Configuration Source: AWS Dpcumentation

Additional Documentation: