Checks/Aws/Test-CloudwatchLogMetricFilterForS3BucketPolicyChanges.ps1
|
function Test-CloudwatchLogMetricFilterForS3BucketPolicyChanges { <# .SYNOPSIS CloudWatch log metric filter and alarm exist for S3 bucket policy changes .DESCRIPTION **CloudTrail** logs are assessed for a **CloudWatch metric filter** matching S3 bucket configuration changes (ACL, policy, CORS, lifecycle, replication; e.g., `PutBucketPolicy`, `DeleteBucketPolicy`) and for an associated **CloudWatch alarm**. .PARAMETER Check CIEMCheck object containing check metadata. #> [CmdletBinding()] [OutputType([PSCustomObject[]])] param( [Parameter(Mandatory)] [CIEMCheck]$Check ) $ErrorActionPreference = 'Stop' # TODO: Implement check logic based on Prowler check: cloudwatch_log_metric_filter_for_s3_bucket_policy_changes [CIEMScanResult]::Create($Check, 'MANUAL', 'This check requires manual implementation. See Prowler check cloudwatch_log_metric_filter_for_s3_bucket_policy_changes for reference.', 'N/A', 'cloudwatch Resources') } |