T-051-001 API event logs
- Governed by
GP-051 Security violations
Purpose
Review API events logs looking for suspicious actions
Periodicity
Every 2 weeks
Cloud trail of AWS review
Responsible | Date | Dashboard review | Insights review |
---|---|---|---|
Help
At the review columns it will be indicated if the review was satisfactory (OK) or if any unexpected action was detected (see below). In this case the reference of the incidence (according to procedure GP-018 Infrastructure and facilities
) or non-conformity (GP-006 Non-conformity. Corrective and Preventive actions
) was included to allow traceability of the actions.
Criteria for acceptance
The logs are reviewed and no suspicious actions are detected:
- Each user is connecting from the expected IP.
- Users are performing the expected actions.
List of unexpected actions:
- Changing other user's credentials.
- Creating new users with administrator permissions.
- Accessing resources that are not part of the project.
- Deleting critical resources as buckets, databases or EC2 instances.
Record signature meaning
- Author: JD-005 Author name
- Review: JD-004 Reviewer name
- Approval: JD-001 Approver name
Template signature meaning
info
Delete this section when you create a new record from this template.
- Author: JD-004 María Diez
- Review: JD-007 Gerardo Fernández
- Approval: JD-001 Ms. Andy Aguilar