-
Features
- Always on
-
Deliver ongoing events for
storage or monitoring
- S3
- CloudWatch
- EventBridge
- Multi-region
- Multi-account
- Log file integrity validation
- Log file encryption
- CloudTrail Insights
-
CloudTrail Lake
- Event Data Store
- Run SQL queries
- Hands-on demo video (12min)
-
CloudTrail Logs
- Query with Amazon Athena
-
Monitor with CloudWatch Logs
- Alarms
- Notifications
-
Partners
- Log Management and Analysis
- Services
-
Monitors and records
- AWS user activity
- AWS API usage
- Support for AWS Organizations
-
CloudTrail event types
- Management or control
plane events (default)
- Data (data plane) events
- CloudTrail Insights events
-
Typical use cases
- Audit activity
- Identify security incidents
- Troubleshoot operational issues
-
Security best practices
-
Detective
- Create a trail
- Apply trails to all AWS Regions
- Enable CloudTrail log file integrity
- Integrate with Amazon CloudWatch Logs
-
Preventative
- Log to a dedicated and centralized Amazon S3 bucket
- Use server-side encryption with AWS KMS managed keys
- Add a condition key to the default Amazon SNS topic policy
- Implement least privilege access to Amazon S3 buckets where you store log files
- Enable MFA Delete on the Amazon S3 bucket where you store log files
- Configure object lifecycle management on the Amazon S3 bucket where you store log files
- Limit access to the AWSCloudTrail_FullAccess policy
- AWS CloudTrail Security Blogs
- AWS re:Post questions for AWS CloudTrail
- AWS CloudTrail FAQs
- Free Cybersecurity Training
- AWS CloudTrail Pricing
- AWS CloudTrail User Guide