AWS CloudTrail

 AWS CloudTrail


AWS CloudTrail - 

  • AWS CloudTrail is a web service that records activity made on your account 
  • A cloudtrail trail can be treated which delivers log files to an S3 bucket
  • CloutTrail is about logging and saves a history of API calls for your AWS account
  • Provides governance, compliance, and operational and auditing of your AWS account 
  • Enabled by default
  • Records the API calls made within the AWS account 
  • Event Retention- 90days
  • CloudTrail logs up to the last 90 days can be analyzed in Cloudtrail console. Older logs should be present in S3 and can be analyzed using athena
  • modification to logs files can be Detected by enabling Log File Validation on the logging bucket 


Event Types - 

Managment Events - 
  • Events of operation that modifies AWS resources like creating IAM user, deleting subnet 
  • Enabled by default 
  • Can saperate read events from write events 
Data Events - 
  • Events of operation that modify data like Lamda function execution, S3 object level activity
  • Disabled by default
Insight Events - 
  • Enable Cloudtrail insight to detect unusual activity in your account like inacccurate resource provisioning,hitting service limits, burst of AWS IAm actions, gaps in periodic maintainance activity 

Encryption - 
  • Cloudtrail logs are encrypted by default using SSE-S3
  • A single KMS key can be used to encypt log files for trails applied to all regions 



CloudTrail vs CloudWatch - 



Comments

Popular posts from this blog

AWS Instance Store

AWS Identity and Access Management

Elastic Block Storage (EBS)