More Info:

This rule checks if Amazon EventBridge custom event buses have a resource-based policy attached. It ensures that proper access controls are in place for custom event buses to prevent unauthorized access and ensure compliance with security best practices.

Risk Level

Low

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the misconfiguration of Resource Policy Attachment in a Custom EventBus for AWS CloudWatch using the AWS Management Console, follow these steps:

  1. Login to AWS Console: Go to the AWS Management Console (https://aws.amazon.com/console/) and login with your credentials.

  2. Navigate to CloudWatch: Click on the “Services” dropdown in the top left corner, search for “CloudWatch” in the search bar, and click on “CloudWatch” to open the CloudWatch dashboard.

  3. Select Event Buses: In the CloudWatch dashboard, locate the “Event Buses” option in the left-hand menu and click on it.

  4. Select Custom EventBus: Find the Custom EventBus that has the misconfigured Resource Policy Attachment and click on it to select it.

  5. Edit Resource Policy: Locate the “Event bus policy” section and click on the “Edit policy” button to modify the Resource Policy Attachment.

  6. Update Resource Policy: In the policy editor, review the existing policy and make necessary changes to ensure that only authorized resources have permission to access the Custom EventBus. You can use the AWS Policy Generator to create a new policy if needed.

  7. Save Changes: After updating the Resource Policy Attachment, click on the “Save changes” button to apply the new policy to the Custom EventBus.

  8. Verify Configuration: Once the policy is updated, verify that the Resource Policy Attachment is correctly configured by checking the permissions and access controls for the Custom EventBus.

By following these steps, you can remediate the misconfiguration of Resource Policy Attachment in a Custom EventBus for AWS CloudWatch using the AWS Management Console.