Knowledge BasePanther.comRelease NotesDemo Request
Search…
Overview
Quick Start
Data Sources & Transports
Writing Detections
Rules
Policies
Testing
Alert Summaries
Detection Packs
Caching
Data Models
Global Helper Functions
Report Mapping
Panther Developer Workflows: Detections
Triaging Alerts
Alert Runbooks
Built-in Policies
Built-in Rules
AWS CloudTrail Modified
AWS Config Service Modified
AWS Console Login Failed
AWS Console Login Without MFA
AWS EC2 Gateway Modified
AWS EC2 Network ACL Modified
AWS EC2 Route Table Modified
AWS EC2 SecurityGroup Modified
AWS EC2 VPC Modified
AWS IAM Policy Modified
AWS KMS CMK Loss
AWS Root Activity
AWS S3 Bucket Policy Modified
AWS Unauthorized API Call
Cloud Security Scanning
Destinations
Data Analytics
Enrichment (Beta)
System Configuration
Panther API (Beta)
Guides
Help
Powered By GitBook
AWS Config Service Modified
This rule monitors for modifications to AWS Config.
Risk
Remediation Effort
Medium
Low
AWS Config is a configuration monitoring tool, and changes to it could mean loss of visibility into configuration changes in your AWS account.
Remediation
If this Config change was not planned, revert the change and investigate who initiated it.
References
  • CIS AWS Benchmark 3.9: "Ensure a log metric filter and alarm exist for AWS Config configuration changes"
Previous
AWS CloudTrail Modified
Next
AWS Console Login Failed
Last modified 1yr ago
Copy link