Troubleshooting control and control set issues
You can use the information on this page to resolve common issues with controls in Audit Manager.
General issues
AWS Config integration issues
-
I need to use multiple AWS Config rules as a data source for a single control
-
The custom rule option is unavailable when I’m configuring a control data source
-
The custom rule option is available, but no rules appear in the dropdown list
-
Some custom rules are available, but I can’t see the rule that I want to use
I can’t see any controls or control sets in my assessment
In short, to view the controls for an assessment, you must be specified as an audit owner for that assessment. Moreover, you need the necessary IAM permissions to view and manage the related Audit Manager resources.
If you need access to the controls in an assessment, ask one of the audit owners for that assessment to specify you as audit owner. You can specify audit owners when you're creating or editing an assessment.
Make sure also that you have the necessary permissions to manage the assessment.
We recommend that audit owners use the AWSAuditManagerAdministratorAccess policy. If you need help with IAM
permissions, contact your administrator or AWS Support
I can’t upload manual evidence to a control
If you can't manually upload evidence to a control, it's likely because the control is in inactive status.
To upload manual evidence to a control, you must first change the control status to either Under review or Reviewed. For instructions, see Changing the status of an assessment control in AWS Audit Manager.
Important
Each AWS account can only manually upload up to 100 evidence files to a control each day. Exceeding this daily quota causes any additional manual uploads to fail for that control. If you need to upload a large amount of manual evidence to a single control, upload your evidence in batches across several days.
What does it mean if a control says “Replacement available”?
If you see this message, this means that an updated control definition is available for one or more of the standard controls in your custom framework. We recommend that you replace these controls so that you can benefit from the improved evidence sources that Audit Manager now provides.
For instructions on how to proceed, see On my custom framework details page, I’m prompted to recreate my custom framework.
I need to use multiple AWS Config rules as a data source for a single control
You can use a combination of managed rules and custom rules for a single control. To do this, define multiple evidence sources for the control, and select your preferred rule type for each one. You can define up to 100 customer managed data sources for a single custom control.
The custom rule option is unavailable when I’m configuring a control data source
This means that you don't have permissions to view custom rules for your AWS account or organization. More specifically, you don't have permissions to perform the DescribeConfigRules operation in the Audit Manager console.
To resolve this issue, contact your AWS administrator for help. If you're an AWS administrator, you can provide permissions for your users or groups by managing your IAM policies.
The custom rule option is available, but no rules appear in the dropdown list
This means that no custom rules are enabled and available for use in your AWS account or organization.
If you don’t have any custom rules yet in AWS Config, you can create one. For instructions, see AWS Config custom rules in the AWS Config Developer Guide.
If you're expecting to see a custom rule, check the following troubleshooting item.
Some custom rules are available, but I can’t see the rule that I want to use
If you can’t see the custom rule that you’re expecting to find, this could be due to one of the following issues.
- Your account is excluded from the rule
-
It's possible that the delegated administrator account that you're using is excluded from the rule.
Your organization's management account (or one of the AWS Config delegated administrator accounts) can create custom organization rules using the AWS Command Line Interface (AWS CLI). When they do so, they can specify a list of accounts to be excluded from the rule. If your account is on this list, the rule isn’t available in Audit Manager.
To resolve this issue, contact your AWS Config administrator for help. If you're an AWS Config administrator, you can update the list of excluded accounts by running the put-organization-config-rule command.
- The rule wasn’t successfully created and enabled in AWS Config
-
It’s also possible that the custom rule wasn't created and enabled successfully. If an error occurred when creating the rule, or the rule isn't enabled, it doesn’t appear in the list of available rules in Audit Manager.
For assistance with this issue, we recommend that you contact your AWS Config administrator.
- The rule is a managed rule
-
If you can't find the rule that you're looking for under the dropdown list of custom rules, it’s possible that the rule is a managed rule.
You can use the AWS Config console
to verify if a rule is a managed rule. To do so, choose Rules in the left navigation menu and look for the rule in the table. If the rule is a managed rule, the Type column shows AWS managed. After you've confirmed that it's a managed rule, return to Audit Manager and select Managed rule as the rule type. Then, look for the managed rule identifier keyword in the dropdown list of managed rules.
I can’t see the managed rule that I want to use
Before you select a rule from the dropdown list in the Audit Manager console, make sure that you selected Managed rule as the rule type.
If you still can’t see the managed rule that you’re expecting to find, it’s possible that you’re looking for the rule name. Instead, you must look for the rule identifier.
If you're using a default managed rule, the name and the identifier are similar.
The name is in lowercase and uses dashes (for example,
iam-policy-in-use
). The identifier is in uppercase and uses
underscores (for example, IAM_POLICY_IN_USE
). To find the identifier
for a default managed rule, review the list of supported AWS Config managed rule keywords and follow the link for
the rule that you want to use. This takes you to the AWS Config documentation for that
managed rule. From here, you can see both the name and the identifier. Look for the
identifier keyword in the Audit Manager dropdown list.
If you're using a custom managed rule, you can use the AWS Config consolecustomized-iam-policy-in-use
. To find the identifier for this rule,
go to the AWS Config console, choose Rules in the left navigation
menu, and choose the rule in the table.
Choose Edit to open details about the managed rule.
Under the Details section, you can find the source identifier
that the managed rule was created from (IAM_POLICY_IN_USE
).
You can now return to the Audit Manager console and select the same identifier keyword from the dropdown list.
I want to share a custom framework, but it has controls that use custom AWS Config rules as a data source. Can the recipient collect evidence for these controls?
Yes, the recipient can collect evidence for these controls, but a few steps are needed to achieve this.
For Audit Manager to collect evidence using an AWS Config rule as a data source mapping, the following must be true. This applies to both managed rules and custom rules.
-
The rule must exist in the recipient’s AWS environment
-
The rule must be enabled in the recipient’s AWS environment
Remember that the custom AWS Config rules in your account likely don’t exist already in the recipient’s AWS environment. Moreover, when the recipient accepts the share request, Audit Manager doesn’t recreate any of your custom rules in their account. For the recipient to collect evidence using your custom rules as a data source mapping, they must create the same custom rules in their instance of AWS Config. After the recipient creates and then enables the rules, Audit Manager can collect evidence from that data source.
We recommend that you communicate with the recipient to let them know if any custom rules need to be created in their instance of AWS Config.
What happens when a custom rule is updated in AWS Config? Do I need to take any action in Audit Manager?
For rule updates within your AWS environment
If you update a custom rule within your AWS environment, no action is needed in Audit Manager. Audit Manager detects and handles the rule updates as described in the following table. Audit Manager doesn't notify you when a rule update is detected.
Scenario | What Audit Manager does | What you need to do |
---|---|---|
A custom rule is updated in your instance of AWS Config |
Audit Manager continues to report findings for that rule using the updated rule definition. | No action is needed. |
A custom rule is deleted in your instance of AWS Config |
Audit Manager stops reporting findings for the deleted rule. |
No action is needed. If you want to, you can edit the custom controls that used the deleted rule as a data source mapping. Doing so helps to clean up your data source settings by removing the deleted rule. Otherwise, the deleted rule name remains as an unused data source mapping. |
For rule updates outside your AWS environment
If a custom rule is updated outside of your AWS environment, Audit Manager doesn’t detect the rule update. This is something to consider if you use shared custom frameworks. This is because, in this scenario, the sender and the recipient each work in separate AWS environments. The following table provides recommended actions for this scenario.
Your role | Scenario | Recommended action |
---|---|---|
Sender |
|
Let the recipient know about your update. That way, they can apply the same update and stay in sync with the latest rule definition. |
Recipient |
|
Make the corresponding rule update in your own instance of AWS Config. |