This section addresses the following exam objectives:
Domain 2: Security Logging and Monitoring
Task Statement 2.2: Troubleshoot security monitoring and alerting
Security monitoring is only effective when it delivers reliable visibility and timely alerts. Misconfigurations, missing permissions, or broken data flows can silently disable detection mechanisms, creating blind spots that attackers may exploit. In exam scenarios, you are often presented with a situation where an expected alert was not generated or a security event was not visible. Your task is to identify what failed in the monitoring pipeline and how to correct it.
Troubleshooting in AWS security monitoring focuses on validating service enablement, permissions, region coverage, integrations, and correct alignment between services and use cases.
AWS provides both centralized and specialized monitoring services. Exam questions frequently test your ability to diagnose why these services are not producing expected findings or alerts.
When AWS Security Hub does not show findings, the most common causes are disabled integrations, missing IAM permissions, or the service not being enabled in all required Regions.
If Amazon GuardDuty produces no findings, the issue is often that data sources such as CloudTrail, VPC Flow Logs, or DNS logs are disabled, or GuardDuty is not enabled in the Region where activity occurred.
For Amazon Inspector, missing assessments usually indicate that target resources were not added or that the required IAM service role is missing.
With Amazon CloudWatch, alarms commonly fail due to incorrect metric filters, misconfigured thresholds, or mismatched namespaces.
If automated workflows do not trigger, Amazon EventBridge is often misconfigured, with event patterns not matching or targets incorrectly defined.
Exam Tip: If findings are missing from a centralized dashboard, always check Security Hub integrations and IAM permissions first.
Effective troubleshooting starts with knowing where evidence should appear. Each AWS log or event stream captures different aspects of security activity.
AWS CloudTrail records API calls, IAM activity, and authentication attempts.
VPC Flow Logs capture network traffic patterns and connection metadata.
DNS query visibility is provided through Route 53 Resolver logs, useful for detecting suspicious domain lookups.
Application-level issues require reviewing custom application logs sent to CloudWatch Logs.
Exam Tip: If a question mentions missing visibility into IAM actions, the root cause is almost always an incomplete or misconfigured CloudTrail setup.
Most monitoring failures fall into three categories.
Service misalignment occurs when the wrong service is used for the task, such as expecting GuardDuty to report operating system vulnerabilities instead of Inspector.
Permission and policy issues prevent services from publishing logs or findings, especially in cross-account setups where delegated administrator roles in AWS Organizations are missing.
Configuration errors include incorrectly defined CloudWatch metric filters, EventBridge rules that do not match incoming events, or Security Hub not being enabled in all Regions.
Exam Tip: Many AWS security services are Region-specific. Always verify Region coverage when alerts or findings are missing.
Custom workloads often rely on application-generated logs and metrics. When alerts fail in these scenarios, troubleshooting should focus on whether the application is publishing data correctly and whether CloudWatch can receive it.
Common issues include missing IAM permissions for publishing metrics or logs, incorrect namespaces, or mismatched dimensions that prevent alarms from triggering.
Example exam scenario:
An application reports failed login attempts, but no CloudWatch alarm fires.
The likely cause is that metrics are being written to an unexpected namespace.
The correct fix is to align CloudWatch metric filters and alarms with the application’s actual output.
Security monitoring must align with organizational goals and regulatory needs.
Compliance and posture management rely on Security Hub and Config conformance packs.
Sensitive data exposure monitoring is handled by Amazon Macie.
Threat detection at scale depends on GuardDuty.
Post-incident investigation and correlation use Amazon Detective.
Exam Tip: If the question asks about evaluating compliance posture across multiple accounts, Security Hub with conformance packs is the correct answer.
Scenario: A CloudWatch alarm is configured to trigger on failed console logins, but no alert is generated.
The correct troubleshooting sequence is to first confirm CloudTrail is enabled and logging ConsoleLogin events. Next, validate that the metric filter pattern matches the log entries exactly. Then verify that the alarm threshold and evaluation period are correctly configured. Finally, ensure that the SNS subscription is confirmed and active.
This structured, step-by-step approach closely mirrors how troubleshooting questions are framed on the exam.
GuardDuty detects threats, Inspector identifies vulnerabilities, Macie finds sensitive data, Config detects misconfigurations, and Security Hub aggregates findings.
When alerts are missing, always check permissions, Region scope, and service integrations first.
EventBridge is the automation backbone—if alerts fail to reach Lambda or SNS, inspect event patterns and targets.
For custom workloads, verify CloudWatch namespaces, IAM permissions, and log group configuration.
The exam strongly favors automated, scalable solutions over manual troubleshooting.
Compliance-focused scenarios usually point to Config and Security Hub conformance packs.
Detective is used when the question emphasizes investigation and correlation after an incident.
Troubleshooting AWS security monitoring is about ensuring that data flows correctly, alerts fire reliably, and monitoring aligns with security objectives. Exam questions frequently describe silent services, missing findings, or alerts that never trigger. Your job is to identify whether the failure stems from permissions, Region coverage, service misalignment, or configuration errors.
By mastering these troubleshooting patterns, you will be well prepared to handle both certification exam scenarios and real-world AWS security monitoring challenges with confidence.