Skip to content

Latest commit

 

History

History
38 lines (23 loc) · 2.08 KB

Readme.md

File metadata and controls

38 lines (23 loc) · 2.08 KB

Enabling CloudTrail

Introduction

AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. This event history simplifies security analysis, resource change tracking, and troubleshooting. In addition, you can use CloudTrail to detect unusual activity in your AWS accounts. These capabilities help simplify operational analysis and troubleshooting.

Cloud Research

  • Event History is where cloudTrail by default logs event data for the past 90days
  • Create trail if you need to track beyond 90days
  • Turn on Log validation to make sure logs are not tampered with
  • CloudTrail logs can be streamed to CloudWatch logs (paid service)
  • Trail can be applied to all regions and Organizations
  • To log data operations for S3 and Lambda, use Data Events. It is disabled by default (Paid service)
  • Query/Analyse trail logs in S3 using Athena
  • Ensure CloudTrail trail logging buckets are not publicly accessible.

Try yourself

  • Search for Cloud Trail in the search box
  • Go to Trails > Create trail
  • cT
  • I didnt create KMS key because it is a charged service
  • ct2
  • ct2
  • cT
  • ct3
  • Delete Trail
  • cT