Section: Exam Notes
Section: Practice Tests

Troubleshooting Security Monitoring, Logging, and Alerting in AWS

This section covers the following exam objective:

Domain 1: Detection
Task Statement 1.3: Troubleshoot security monitoring, logging, and alerting solutions


1. Understanding Troubleshooting in AWS Security Monitoring

Troubleshooting in AWS security monitoring focuses on identifying why logs, alerts, or monitoring signals are missing, incorrect, or delayed. In most cloud environments, the root cause is typically misconfiguration, rather than system failure.

What to Expect in Exam Scenarios

You will encounter situations where:

  • Logs are not generated or visible
  • Alerts are not triggered
  • Monitoring is partially functioning

Your objective is to identify issues related to:

  • Misconfigurations
  • IAM permission problems
  • Incorrect service integrations

Common Troubleshooting Areas

AreaTypical IssueRoot Cause
LoggingMissing logsLogging not enabled or misconfigured
PermissionsAccess deniedIAM role or policy issues
MonitoringNo metrics availableAgent not installed or configured
AlertingAlerts not triggeredCloudWatch alarm misconfiguration

2. Analyzing Resource Functionality

Before applying fixes, validate the following:

  • Service configuration
  • IAM permissions
  • Integration between services

AWS Lambda Logging Issues

IssueCauseFix
No logs in CloudWatchMissing IAM roleAttach AWSLambdaBasicExecutionRole
Incomplete logsFunction timeout or errorsCheck execution duration and errors
Delayed logsAsynchronous invocationReview retry behavior

API Gateway Logging Issues

IssueCauseFix
No access logsLogging not enabledEnable logging in stage settings
No execution logsMissing IAM roleAttach CloudWatch logging role
Partial logsIncorrect log formatVerify log configuration

CloudFront Logging Issues

IssueCauseFix
No logs generatedLogging disabledEnable standard logging
Logs missing in S3Incorrect bucket policyUpdate S3 permissions
Log delivery delayExpected behaviorCloudFront logs are delayed by design

Health Checks and Monitoring Issues

ServiceIssueFix
Route 53 Health ChecksNot triggeringVerify endpoint availability
CloudWatch AlarmsNot firingCheck thresholds and metrics
ELB Health ChecksInstances unhealthyValidate path and port configuration

3. Permissions Troubleshooting

IAM permissions are one of the most common causes of issues—and a frequent exam trap.

Key Validation Checks

  • Is the correct IAM role attached?
  • Does the policy allow required actions?
  • Is the trust relationship properly configured?

Example: CloudWatch Logging Failure

ProblemRoot Cause
EC2 not sending logsMissing IAM permissions
Logs not visibleIncorrect log group ARN
Agent not functioningConfiguration file errors

4. Fixing Misconfigurations

Once the issue is identified, remediation involves correcting configurations and verifying outputs.


CloudWatch Agent Troubleshooting

IssueCauseFix
Agent not sending logsAgent not runningStart the agent
Logs missingIncorrect config fileUpdate JSON configuration
Permission errorsMissing IAM roleAttach required permissions

Missing Logs Troubleshooting Workflow

Follow this sequence:

  1. Confirm logging is enabled
  2. Check IAM permissions
  3. Validate destination (S3 or CloudWatch)
  4. Verify service integration
  5. Ensure correct region configuration

CloudTrail Troubleshooting

IssueCauseFix
No logs generatedTrail not enabledEnable multi-region trail
Missing eventsIncorrect event typeEnable data events
Logs missing in S3Bucket policy issueUpdate permissions

5. Alerting Troubleshooting

CloudWatch Alarms

IssueCauseFix
Alarm not triggeredIncorrect thresholdAdjust metric threshold
No notificationsSNS not configuredAttach SNS topic
Alarm inactiveNo metric dataVerify metric source

SNS Notification Issues

IssueCauseFix
No alerts receivedSubscription not confirmedConfirm subscription
Email not deliveredSpam filteringCheck spam folder
Lambda not triggeredMissing permissionsAdd invoke permission

6. End-to-End Troubleshooting Pipeline

Example Scenario

Problem: Alerts are not triggered for suspicious API activity

Investigation Flow

  1. CloudTrail → Verify logs are generated
  2. CloudWatch Logs → Confirm ingestion
  3. Metric Filter → Validate pattern matching
  4. Alarm → Check threshold configuration
  5. SNS → Confirm subscription and delivery

7. Common Troubleshooting Patterns

Pattern 1: Missing Logs

  • Logging not enabled
  • Incorrect region
  • IAM permission issues

Pattern 2: Logs Present but No Alerts

  • Metric filter misconfigured
  • Alarm threshold incorrect

Pattern 3: Alerts Triggered but No Notifications

  • SNS misconfiguration
  • Subscription not confirmed

Pattern 4: Partial Monitoring Coverage

  • Agent not deployed across all resources
  • Logging not centralized in multi-account environments

8. Key Exam Tips

Tip 1: Start with Permissions

Most issues are related to IAM roles or policies.

Tip 2: Verify Logging First

If logs are not generated, detection cannot occur.

Tip 3: Validate the Full Pipeline

Always trace the flow:
CloudTrail → CloudWatch → Alarm → SNS

Tip 4: Check Region Alignment

Logs, metrics, and alarms must exist in the same region.

Tip 5: Agent-Based Logging

  • Ensure agent is installed
  • Validate configuration file
  • Confirm IAM permissions

Tip 6: CloudWatch Alarms

  • Require correct metric and threshold
  • Must be connected to SNS

Tip 7: Service-Specific Logging

  • Lambda → requires execution role
  • API Gateway → logging must be enabled
  • CloudFront → logs are delayed by design

Final Thoughts

Troubleshooting AWS security monitoring requires a systematic, end-to-end validation approach.

Focus on:

  • Identifying missing or incorrect configurations
  • Understanding IAM dependencies
  • Tracing logs from source to alert

Key Takeaways

  • If logs are missing, detection is impossible
  • If alerts do not trigger, response cannot occur
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Hide picture