AWS CloudTrail
AWS CloudTrail
AWS CloudTrail -
- AWS CloudTrail is a web service that records activity made on your account
- A cloudtrail trail can be treated which delivers log files to an S3 bucket
- CloutTrail is about logging and saves a history of API calls for your AWS account
- Provides governance, compliance, and operational and auditing of your AWS account
- Enabled by default
- Records the API calls made within the AWS account
- Event Retention- 90days
- CloudTrail logs up to the last 90 days can be analyzed in Cloudtrail console. Older logs should be present in S3 and can be analyzed using athena
- modification to logs files can be Detected by enabling Log File Validation on the logging bucket
Event Types -
Managment Events -
- Events of operation that modifies AWS resources like creating IAM user, deleting subnet
- Enabled by default
- Can saperate read events from write events
Data Events -
- Events of operation that modify data like Lamda function execution, S3 object level activity
- Disabled by default
Insight Events -
- Enable Cloudtrail insight to detect unusual activity in your account like inacccurate resource provisioning,hitting service limits, burst of AWS IAm actions, gaps in periodic maintainance activity
Encryption -
- Cloudtrail logs are encrypted by default using SSE-S3
- A single KMS key can be used to encypt log files for trails applied to all regions
CloudTrail vs CloudWatch -
Comments
Post a Comment