Activate or Deactivate AWS Monitors Using AWS Resource Tags

Learn how to activate or deactivate specific Sprinto AWS monitors using resource-level AWS tags for precise and customizable compliance monitoring.

Sprinto allows you to activate or deactivate individual AWS monitors at the resource level using AWS tags. This gives you fine-grained control over which EC2 instances, load balancers, or other AWS resources should be evaluated by Sprinto’s monitoring engine.

This feature is particularly useful when:

  • A resource is non-production, ephemeral, or excluded from your compliance boundary

  • You want to suppress a specific monitor for a single resource without disabling it globally

  • Autoscaling behaviour results in noisy or irrelevant alerts


How the Tagging System Works

Sprinto looks for AWS resource tags in the format:

SPRINTO_<MONITOR_KEY>

These tags accept the following values:

Tag Value
Behaviour

deactivate

Sprinto will exclude the resource from the selected monitor

activate

Sprinto will force include the resource in the monitor

If no tag is applied, Sprinto uses the default evaluation logic.

Tags must be assigned directly on the AWS resource (EC2, Load Balancer, etc.).


Supported Monitor Keys & Tag Reference

Below is the complete list of monitors (provided by engineering) that support tag-based control, along with their descriptions.

EC2 & Compute monitors

Monitor key
Description

EC2_PUBLIC_ACCESS_PROTECTED

AWS EC2 instance should be protected from direct internet traffic.

EC2_SERVER_CPU_MONITORED

AWS EC2 instance CPU utilization should be monitored.

EC2_SERVER_MEMORY_MONITORED

(monitor present in file; memory utilization monitored).

AWS_UNUSED_CREDENTIALS_DISABLED

AWS credentials not used in last 90 days should be disabled.

LIGHTSAIL_INSTANCE_CPU_MONITORED

AWS Lightsail instance CPU utilization should be monitored.

LIGHTSAIL_DISK_ENCRYPTED

AWS Lightsail disk should be encrypted.

LIGHTSAIL_DISK_BACKUP_ENABLED

AWS Lightsail disk backup should be enabled.

ECS_CPU_UTILIZATION_MONITORED

AWS ECS CPU utilization should be monitored.

ECS_MEMORY_UTILIZATION_MONITORED

AWS ECS memory utilization should be monitored.

Load balancers (ELB / ALB / CLB / NLB)

Monitor key
Description

IS_LOAD_BALANCER_VALID

AWS load balancer should have valid configuration.

LOAD_BALANCER_ERRORS_MONITORED

AWS load balancer errors should be monitored.

CLASSIC_LOAD_BALANCER_ERRORS_MONITORED

AWS classic load balancer errors should be monitored.

LOAD_BALANCER_LATENCY_MONITORED

AWS load balancer latency should be monitored.

CLASSIC_LOAD_BALANCER_LATENCY_MONITORED

AWS classic load balancer latency should be monitored.

LOAD_BALANCER_HEALTHY_HOST_COUNT_MONITORED

AWS load balancer healthy host count should be monitored.

LOAD_BALANCER_HOST_HEALTH_MONITORED

AWS load balancer host health should be monitored.

LOAD_BALANCER_HTTP_TO_HTTPS_REDIRECT_MONITORED

AWS load balancer should redirect traffic from http to https.

ELB_PUBLIC_ACCESS_PROTECTED

AWS application load balancer should be protected from direct internet traffic.

Networking & VPC

Monitor key
Description

VPC_FLOW_LOGS_ENABLED

AWS VPC flowlogs should be captured.

AWS_ON_HTTPS

AWS should be on https.

AWS_REDIRECTS_HTTP_TO_HTTPS

AWS should redirect http to https.

ELASTICACHE_CURRENT_CONNECTIONS_MONITORED

AWS ElastiCache current connections should be monitored.

ELASTICACHE_CPU_MONITORED

AWS ElastiCache datastore CPU utilization should be monitored.

ELASTICACHE_FREEABLE_MEMORY_MONITORED

AWS ElastiCache freeable memory should be monitored.

LOAD_BALANCER_ACTIVE_CONNECTIONS_MONITORED

(if present) Active connections monitored for load balancers.

S3 & Storage

Monitor key
Description

S3_STORAGE_ENCRYPTED

AWS S3 storage bucket should be encrypted.

S3_PUBLIC_ACCESS_BLOCK_ENABLED

AWS S3 bucket public access should be blocked.

S3_STORAGE_VERSIONING_ENABLED

AWS S3 bucket should be versioned.

AWS_S3_ACCESS_LOGGING_ENABLED

AWS S3 server access logging should be enabled for important buckets.

AWS_ACCESS_LOG_RETENTION_VALID

AWS server access logs should be retained for 90 days.

EFS_STORAGE_ENCRYPTED

AWS EFS storage should be encrypted.

EFS_STORAGE_BACKUP_ENABLED

AWS EFS storage backup should be enabled.

FSX_FS_STORAGE_ENCRYPTED

AWS FSX File System storage should be encrypted.

FSX_FS_STORAGE_BACKUP_ENABLED

AWS FSX File System storage backup should be enabled.

EBS_VOLUME_ENCRYPTED

AWS EBS volume should be encrypted.

EBS_VOLUME_BACKUP_ENABLED

AWS EBS volume backup should be enabled.

EBS_HEALTH_MONITORED

AWS EBS health should be monitored.

Databases (RDS / DynamoDB / Redshift / ElastiSearch/OpenSearch)

Monitor key
Description

RDS_BACKUP_ENABLED

AWS RDS database backup should be enabled.

RDS_CPU_MONITORED

AWS RDS database CPU utilization should be monitored.

RDS_STORAGE_ENCRYPTED

AWS RDS database storage should be encrypted.

RDS_FREE_SPACE_ALERT_SET

AWS RDS database freespace should be monitored.

RDS_FREEABLE_MEMORY_MONITORED

AWS RDS Database freeable memory should be monitored.

RDS_DB_IO_MONITORED

AWS RDS database IO utilization should be monitored.

RDS_PUBLIC_ACCESS_PROTECTED

(present in file) RDS instances should block public access.

DYNAMO_DB_ENCRYPTED

AWS DynamoDB should be encrypted.

DYNAMO_DB_BACKUP_ENABLED

AWS DynamoDB backup should be enabled.

DYNAMO_DB_LATENCY_MONITORED

AWS DynamoDB latency should be monitored.

DYNAMO_DB_READ_CAPACITY_MONITORED

AWS DynamoDB read capacity should be monitored.

DYNAMO_DB_WRITE_CAPACITY_MONITORED

AWS DynamoDB write capacity should be monitored.

REDSHIFT_HEALTH_MONITORED

AWS Redshift health should be monitored.

REDSHIFT_CPU_UTILIZATION_MONITORED

AWS Redshift CPU utilization should be monitored.

REDSHIFT_CLUSTER_ENCRYPTED

AWS Redshift cluster should be encrypted.

REDSHIFT_CLUSTER_BACKUP_ENABLED

AWS Redshift cluster backup should be enabled.

ELASTIC_SEARCH_CLUSTER_STATUS_MONITORED

AWS Elasticsearch cluster health should be monitored.

ELASTIC_SEARCH_CPU_UTILIZATION_MONITORED

AWS Elasticsearch cluster CPU utilization should be monitored.

ELASTIC_SEARCH_FREE_SPACE_MONITORED

AWS Elasticsearch cluster freespace should be monitored.

FSX_FS_FREE_SPACE_MONITORED

AWS FSX File System freespace should be monitored.

Messaging & Queueing (SQS / SNS)

Monitor key
Description

SQS_MESSAGES_VISIBLE_MONITORED

AWS SQS messages visibility should be monitored.

SQS_MESSAGES_AGE_MONITORED

AWS SQS messages age should be monitored.

SNS_TOPIC_MONITORED

(if present) SNS / topic monitoring entries appear in file.

Container & Image (ECR)

Monitor key
Description

ECR_REPOSITORY_ENCRYPTED

AWS ECR repository should be encrypted.

API Gateway & Other infra

Monitor key
Description

API_GATEWAY_ERRORS_MONITORED

AWS API gateway V2 errors should be monitored.

API_GATEWAY_V1_ERRORS_MONITORED

AWS API gateway V1 errors should be monitored.

Security & Audit (CloudTrail, GuardDuty, KMS, IAM, password policy, root)

Monitor key
Description

CLOUD_TRAIL_EXISTS

AWS CloudTrail should be enabled.

CLOUD_TRAIL_LOG_FILE_INTEGRITY_VALIDATION_ENABLED

AWS CloudTrail log file integrity validation should be enabled.

CLOUD_TRAIL_S3_LOGGING_ENABLED

AWS Cloud Trail S3 logging bucket access logging should be enabled.

CLOUD_TRAIL_S3_LOG_PUBLIC_ACCESS_PROTECTED

AWS Cloud Trail logging bucket should be protected from direct internet traffic.

GUARD_DUTY_ENABLED

AWS GuardDuty should be enabled.

KMS_KEYS_ROTATION (e.g., KMS_ENCRYPTION_KEYS_ROTATION)

(rotation/rotation-period monitors exist for KMS in file — e.g., 90-day rotation checks).

S3_PUBLIC_ACCESS_BLOCK_ENABLED

AWS S3 bucket public access should be blocked.

AWS_ROOT_ACCOUNT_MFA_ENABLED

AWS root account should have MFA enabled.

AWS_ROOT_ACCOUNT_UNUSED

AWS root account usage should be avoided / root account usage monitored.

AWS_USER_ACCESS_KEYS_ROTATED

AWS user access keys should not be older than 90 days.

AWS_USERS_IAM_POLICIES_NOT_ATTACHED

AWS users should not have attached IAM policies (i.e., policies should be attached to groups).

AWS_PASSWORD_POLICY_CONFIGURED

AWS account password policy should be configured.

AWS_GROUPS_POLICIES_ATTACHED

AWS groups should have at least one IAM policy.

AWS_ACCESS_LOG_RETENTION_VALID

This check confirms S3 server access logs are retained for at least 90 days.

CLOUD_TRAIL_S3_LOGGING_ENABLED (bucket access logging)

AWS Cloud Trail S3 logging bucket access logging should be enabled.

Misc / Other AWS monitors found in file

Monitor key
Description

FIRE_HOSE_THROTTLE_MONITORED

AWS Firehose stream throttling should be monitored.

ECR_REPOSITORY_ENCRYPTED

This check ensures that the AWS ECR repository has appropriate configurations in place to encrypt data both at rest and in transit.

EBS_HEALTH_MONITORED

This check confirms that Amazon EBS volumes have health monitoring enabled.

INFRA_MONITORED_IN_DATADOG

This check confirms Datadog integration is active for infrastructure monitoring.


How to Apply These Tags in AWS

Steps

  1. Open the AWS Console

  2. Navigate to the resource (EC2 instance, Load Balancer, and so on)

  3. Go to the Tags tab

  4. Click Manage Tags → Add Tag

  5. Enter the Sprinto monitor key in the Tag Key field

  6. Set the value to either:

    • activate

    • deactivate

  7. Save the tag

  8. Return to Sprinto and click Re-evaluate on the failing check


Examples

Deactivate Load Balancer Latency Monitoring for a Specific ELB

Key:

Value:


Force Activation of EC2 Instance CPU Monitoring

(Useful when Sprinto would normally ignore the resource)

Key:

Value:


Behaviour Notes

  • Tags override Sprinto logic only for the tagged resource

  • Removing the tag restores default behaviour

  • Tags should be added to IaC templates (Terraform, CloudFormation) for autoscaling fleets

  • If tags do not appear to work, check capitalization and spelling


Troubleshooting

Monitor Still Failing After Tagging?

Check:

  • Tag key matches exactly (uppercase required)

  • Tag value is activate or deactivate only

  • Tag was applied to the correct AWS resource

  • The Sprinto monitor has been re-evaluated

  • AWS pipelines are not overwriting tags

Last updated