MEDIUM
Source
CloudSploit
ID
security-list-changes

Security List Changes

Ensure an event rule is configured for security list changes.

Monitoring changes to security lists like create, update and delete will help in identifying changes to the security controls.

Configure an event rule for security list changes like create, update and delete.