This section covers the following exam objective:
Domain 1: Detection
Task Statement 1.3: Troubleshoot security monitoring, logging, and alerting solutions
Troubleshooting in AWS security monitoring focuses on identifying why logs, alerts, or monitoring signals are missing, incorrect, or delayed. In most cloud environments, the root cause is typically misconfiguration, rather than system failure.
You will encounter situations where:
Your objective is to identify issues related to:
| Area | Typical Issue | Root Cause |
|---|---|---|
| Logging | Missing logs | Logging not enabled or misconfigured |
| Permissions | Access denied | IAM role or policy issues |
| Monitoring | No metrics available | Agent not installed or configured |
| Alerting | Alerts not triggered | CloudWatch alarm misconfiguration |
Before applying fixes, validate the following:
| Issue | Cause | Fix |
|---|---|---|
| No logs in CloudWatch | Missing IAM role | Attach AWSLambdaBasicExecutionRole |
| Incomplete logs | Function timeout or errors | Check execution duration and errors |
| Delayed logs | Asynchronous invocation | Review retry behavior |
| Issue | Cause | Fix |
|---|---|---|
| No access logs | Logging not enabled | Enable logging in stage settings |
| No execution logs | Missing IAM role | Attach CloudWatch logging role |
| Partial logs | Incorrect log format | Verify log configuration |
| Issue | Cause | Fix |
|---|---|---|
| No logs generated | Logging disabled | Enable standard logging |
| Logs missing in S3 | Incorrect bucket policy | Update S3 permissions |
| Log delivery delay | Expected behavior | CloudFront logs are delayed by design |
| Service | Issue | Fix |
|---|---|---|
| Route 53 Health Checks | Not triggering | Verify endpoint availability |
| CloudWatch Alarms | Not firing | Check thresholds and metrics |
| ELB Health Checks | Instances unhealthy | Validate path and port configuration |
IAM permissions are one of the most common causes of issues—and a frequent exam trap.
| Problem | Root Cause |
|---|---|
| EC2 not sending logs | Missing IAM permissions |
| Logs not visible | Incorrect log group ARN |
| Agent not functioning | Configuration file errors |
Once the issue is identified, remediation involves correcting configurations and verifying outputs.
| Issue | Cause | Fix |
|---|---|---|
| Agent not sending logs | Agent not running | Start the agent |
| Logs missing | Incorrect config file | Update JSON configuration |
| Permission errors | Missing IAM role | Attach required permissions |
Follow this sequence:
| Issue | Cause | Fix |
|---|---|---|
| No logs generated | Trail not enabled | Enable multi-region trail |
| Missing events | Incorrect event type | Enable data events |
| Logs missing in S3 | Bucket policy issue | Update permissions |
| Issue | Cause | Fix |
|---|---|---|
| Alarm not triggered | Incorrect threshold | Adjust metric threshold |
| No notifications | SNS not configured | Attach SNS topic |
| Alarm inactive | No metric data | Verify metric source |
| Issue | Cause | Fix |
|---|---|---|
| No alerts received | Subscription not confirmed | Confirm subscription |
| Email not delivered | Spam filtering | Check spam folder |
| Lambda not triggered | Missing permissions | Add invoke permission |
Problem: Alerts are not triggered for suspicious API activity
Most issues are related to IAM roles or policies.
If logs are not generated, detection cannot occur.
Always trace the flow:
CloudTrail → CloudWatch → Alarm → SNS
Logs, metrics, and alarms must exist in the same region.
Troubleshooting AWS security monitoring requires a systematic, end-to-end validation approach.
Focus on: