Skip to content

Latest commit

 

History

History
30 lines (23 loc) · 1.52 KB

aws-cloudtrail.md

File metadata and controls

30 lines (23 loc) · 1.52 KB

Track user activity and API usage in your AWS account

  • Log files are delivered to Amazon S3 buckets
  • Automatically detect unusual account activity
  • Continuously monitor user activities and record API calls
  • Useful for compliance auditing, security analysis, and troubleshooting
  • Filter logs generated by API calls to assist with operational analysis and troubleshooting

API Security-Relevant Information

  • Who?
  • What?
  • When?
  • Where?

Example: Coffee Shop Events

graph LR
  A[<b>3 days ago</b><br>The cashiers process a large number of transactions] --> B[<b>2 days ago</b><br> To avoid running out of supplies, the inventory specialist places an extra order.]
  B --> C[<b>Today</b><br>A shipment of coffee beans is delivered to the coffee shop.]
Loading

AWS CloudTrail is an AWS service that helps you enable operational and risk auditing, governance, and compliance of your AWS account. Actions taken by a user, role, or an AWS service are recorded as events in CloudTrail. Events include actions taken in the AWS Management Console, AWS Command Line Interface, and AWS SDKs and APIs.

CloudTrail is enabled on your AWS account when you create it. When activity occurs in your AWS account, that activity is recorded in a CloudTrail event. You can easily view recent events in the CloudTrail console by going to Event history.

AWS CloudTrail Event