Lädt...

🔧 Learning AWS Day by Day — Day 64 — AWS CloudTrail


Nachrichtenbereich: 🔧 Programmierung
🔗 Quelle: dev.to

Exploring AWS !!

Day 64

AWS CloudTrail

Image description

  • Helps enabling operational and risk auditing, governance, and compliance of the AWS account.
  • Any actions taken by user, roles or AWS account services, are being recorded as events by CloudTrail.
  • The CloudTrail is active in your AWS account since you create the account, also each and every action is being recorded.

3 ways to record events:

  1. Event history — provides a history of 90 days of management events.
  2. CloudTrail lake — data lake for storing and accessing user and API activity for auditing and security purposes. CloudTrail lake converts JSON format events to Apache ORC format. ORC is columnar format data for fast retrieval of data. The event data store can store data for approximately 10 years. Any existing event data logs in S3 can be stored in new or existing event data store.
  3. Trails — captures a record of activities, delivering and storing these events in S3, and also in CloudWatch or Eventbridge, which is optional. Athena can be used to search and analyze your logs.

How it works?

You have a direct access to Event History, which keeps a track since your account gets created. You can view, search or download these logs as per your requirement. The event history is accessible and viewable for 90 days, and event history is not connected to any trail or event data stores, so any configurations or changes you make do not affect trails and data stores.
An event data store can be created to log CloudTrail events, CloudTrail Insights events, AWS Audit Manager evidence, AWS Config configuration items, or events outside of AWS. Event data store used for integration events logs outside AWS, must be single region only, and not multi-region.

Tasks that can be performed on event data stores: View lake Dashboards, Log managements events, Log data events, Log insights events, Copy trail events, Enable federation on an event data store, Stop or start event ingestion on an event data store, Create an integration with an event source outside of AWS, View Lake sample queries in the CloudTrail console, Create or edit a query, Save query results to an S3 bucket, Download saved query results and Validate saved query results.

CloudTrail channels:
Channels for CloudTrail Lake integrations with event sources outside of AWS:
CloudTrail Lake uses channels to bring events from outside of AWS into CloudTrail Lake from external partners that work with CloudTrail, or from your own sources.
Service-linked channels:
AWS services can create a service-linked channel to receive CloudTrail events on your behalf.

CloudTrail logs 3 types of events:
Management events, Data events, Insights events
Management events: Configuring security, registering devices, configuring rules, setting up logging
Data events: provides information about resource operations performed on resource or in resource, also known as data plane.
Insights events: capture unusual API call rate or error rate activity

...

🔧 Learning AWS Day by Day — Day 64 — AWS CloudTrail


📈 42.61 Punkte
🔧 Programmierung

🔧 AWS CloudTrail Insights for AWS Glue


📈 30.72 Punkte
🔧 Programmierung

🔧 AWS Logging, Monitoring & Auditing with AWS CloudWatch and CloudTrail!


📈 30.72 Punkte
🔧 Programmierung

🔧 AWS CloudTrail Logs : Boost Your Security Now


📈 26.69 Punkte
🔧 Programmierung

🔧 AWS CloudTrail Logs : Boost Your Security Now


📈 26.69 Punkte
🔧 Programmierung

🔧 Query AWS CloudTrail Logs Locally with SQL


📈 26.69 Punkte
🔧 Programmierung

🔧 AWS CloudTrail


📈 26.69 Punkte
🔧 Programmierung

📰 Send SUSE Security (NeuVector) events to AWS CloudTrail Lake


📈 26.69 Punkte
🐧 Unix Server

📰 Detecting AWS Account Compromise: Key Indicators in CloudTrail Logs for Stolen API Keys


📈 26.69 Punkte
📰 IT Security Nachrichten

🔧 Log CloudTrail events to DynamoDB using AWS State Machine


📈 26.69 Punkte
🔧 Programmierung

🔧 Mastering AWS CloudTrail: The Omniscient Eye for Auditing and Logging Supremacy


📈 26.69 Punkte
🔧 Programmierung

🔧 Tactical Cloud Audit Log Analysis with DuckDB - AWS CloudTrail


📈 26.69 Punkte
🔧 Programmierung

🔧 Provisioning AWS CloudTrail using Terraform (Step-by-Step)


📈 26.69 Punkte
🔧 Programmierung

🔧 AWS CloudTrail Centralized logging


📈 26.69 Punkte
🔧 Programmierung

🎥 Evading Logging in the Cloud: Bypassing AWS CloudTrail


📈 26.69 Punkte
🎥 IT Security Video

📰 Threat Hunting AWS CloudTrail with Sentinel: Part 3


📈 26.69 Punkte
📰 IT Security Nachrichten

🔧 Tips to Use AWS CloudTrail and CloudWatch for Monitoring and Security


📈 26.69 Punkte
🔧 Programmierung

📰 Threat Hunting AWS CloudTrail with Microsoft Sentinel: Part 4


📈 26.69 Punkte
📰 IT Security Nachrichten

🔧 Tips to Use AWS CloudTrail and CloudWatch for Monitoring and Security


📈 26.69 Punkte
🔧 Programmierung

🔧 CloudFormation policy compliance monitoring: leveraging CloudTrail and Athena


📈 22.65 Punkte
🔧 Programmierung

🔧 Amazon EKS: Analyze control plane and CloudTrail logs for better detective controls


📈 22.65 Punkte
🔧 Programmierung

🐧 A Comparison Between CloudTrail and GuardDuty


📈 22.65 Punkte
🐧 Linux Tipps

🔧 Learning AWS Day by Day — Day 75 — AWS CloudFront


📈 19.96 Punkte
🔧 Programmierung

🔧 Learning AWS Day by Day — Day 74 — AWS Organization Concepts


📈 19.96 Punkte
🔧 Programmierung

🔧 Learning AWS Day by Day — Day 73 — AWS Organizations


📈 19.96 Punkte
🔧 Programmierung

🔧 Learning AWS Day by Day — Day 66 — AWS CodePipeline


📈 19.96 Punkte
🔧 Programmierung

🔧 Learning AWS Day by Day — Day 62 — AWS Key Management Service


📈 19.96 Punkte
🔧 Programmierung

🔧 Learning AWS Day by Day — Day 45 — AWS Lambda


📈 19.96 Punkte
🔧 Programmierung

🔧 Learning AWS Day by Day — Day 36 — AWS Services — At a Glance — Part 2


📈 19.96 Punkte
🔧 Programmierung

🔧 Learning AWS Day by Day — Day 36 — AWS Services — At a Glance — Part 1


📈 19.96 Punkte
🔧 Programmierung