Difference between revisions of "AWS CloudTrail"
Jump to navigation
Jump to search
↑ https://aws.amazon.com/es/about-aws/whats-new/2013/11/13/announcing-aws-cloudtrail/
↑ https://aws.amazon.com/cloudtrail/faqs/#Event_payload.2C_timeliness.2C_and_delivery_frequency
↑ https://aws.amazon.com/blogs/aws/announcing-cloudtrail-insights-identify-and-respond-to-unusual-api-activity/
↑ https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/BidEvictedEvent.html
Tags: Mobile web edit, Mobile edit |
|||
(19 intermediate revisions by 5 users not shown) | |||
Line 1: | Line 1: | ||
− | [[AWS]] | + | [[wikipedia:AWS CloudTrail]] <ref>https://aws.amazon.com/es/about-aws/whats-new/2013/11/13/announcing-aws-cloudtrail/</ref> ([[AWS timeline|Nov 2013]]) is a web service that records [[API]] calls made on your account and delivers log files to your [[AWS S3]] bucket every 5 minutes<ref>https://aws.amazon.com/cloudtrail/faqs/#Event_payload.2C_timeliness.2C_and_delivery_frequency</ref>. Third party products such as [[CloudCheckr]] and [[Splunk]] can help you to analyze logs. Basic functionality of AWS CloudTrail is enabled on all AWS accounts by default and records up to 90 days of your account activity upon account creation. |
− | * https://aws.amazon.com/cloudtrail/ | + | |
+ | * Homepage: https://aws.amazon.com/cloudtrail/ | ||
+ | |||
+ | * [[AWS CloudTrail Insights]] | ||
+ | * [[AWS CloudTrail Lake]] | ||
== [[Pricing]] == | == [[Pricing]] == | ||
Line 7: | Line 11: | ||
== Change log == | == Change log == | ||
− | * https://aws.amazon.com/about-aws/whats-new/2020/08/aws-cloudtrail-now-provides-relevant-user-statistics-to-act-on-anomalies-detected-by-cloudtrail-insights/ | + | * [[AWS CloudTrail Insights]] https://aws.amazon.com/about-aws/whats-new/2020/08/aws-cloudtrail-now-provides-relevant-user-statistics-to-act-on-anomalies-detected-by-cloudtrail-insights/ |
== Activities == | == Activities == | ||
Line 16: | Line 20: | ||
== Related terms == | == Related terms == | ||
* [[AWS CloudTrail Insights]] (Noviembre 2019)<ref>https://aws.amazon.com/blogs/aws/announcing-cloudtrail-insights-identify-and-respond-to-unusual-api-activity/</ref> | * [[AWS CloudTrail Insights]] (Noviembre 2019)<ref>https://aws.amazon.com/blogs/aws/announcing-cloudtrail-insights-identify-and-respond-to-unusual-api-activity/</ref> | ||
− | * [[AWS Config]] | + | * [[AWS Config]] (Dec 2015) |
+ | * [[Amazon GuardDuty]] (Nov 2017) analyzes AWS CloudTrail logs | ||
* [[Elastic SIEM]] | * [[Elastic SIEM]] | ||
* [[IAM Access Analyzer]] | * [[IAM Access Analyzer]] | ||
Line 22: | Line 27: | ||
* [[Governance]], [[Compliance]] | * [[Governance]], [[Compliance]] | ||
* [[FedRAMP]] and [[PCI-DSS]] | * [[FedRAMP]] and [[PCI-DSS]] | ||
+ | * <code>[[acct]]</code> | ||
+ | * [[Oracle Cloud Infrastructure Audit]] + [[Oracle Cloud Logging]] | ||
+ | * [[Amazon EC2 Spot Instances]]: <code>BidEvictedEvent</code> event <ref>https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/BidEvictedEvent.html</ref> | ||
+ | * [[CloudTrail Events]] | ||
== See also == | == See also == | ||
Line 27: | Line 36: | ||
* {{CloudTrail}} | * {{CloudTrail}} | ||
* {{AWS security}} | * {{AWS security}} | ||
+ | * {{AWS compliance}} | ||
* {{AWS Governance}} | * {{AWS Governance}} | ||
Latest revision as of 07:44, 18 May 2023
wikipedia:AWS CloudTrail [1] (Nov 2013) is a web service that records API calls made on your account and delivers log files to your AWS S3 bucket every 5 minutes[2]. Third party products such as CloudCheckr and Splunk can help you to analyze logs. Basic functionality of AWS CloudTrail is enabled on all AWS accounts by default and records up to 90 days of your account activity upon account creation.
- Homepage: https://aws.amazon.com/cloudtrail/
Pricing[edit]
- Management events: Always free
- Data events: 0.10 per 100,000 data events delivered
Change log[edit]
- AWS CloudTrail Insights https://aws.amazon.com/about-aws/whats-new/2020/08/aws-cloudtrail-now-provides-relevant-user-statistics-to-act-on-anomalies-detected-by-cloudtrail-insights/
Activities[edit]
- Read https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-receive-logs-from-multiple-accounts.html
- Read best practices: https://aws.amazon.com/blogs/mt/aws-cloudtrail-best-practices/
- Read blog: https://aws.amazon.com/blogs/mt/category/management-tools/aws-cloudtrail/
Related terms[edit]
- AWS CloudTrail Insights (Noviembre 2019)[3]
- AWS Config (Dec 2015)
- Amazon GuardDuty (Nov 2017) analyzes AWS CloudTrail logs
- Elastic SIEM
- IAM Access Analyzer
- AWS CloudFormation
- Governance, Compliance
- FedRAMP and PCI-DSS
acct
- Oracle Cloud Infrastructure Audit + Oracle Cloud Logging
- Amazon EC2 Spot Instances:
BidEvictedEvent
event [4] - CloudTrail Events
See also[edit]
- AWS CloudTrail:
aws cloudtrail
[get-event-selectors | lookup-events | list-trails
] - AWS CloudTrail, AWS CloudTrail Insights, CloudTrail Events, AWS CloudTrail Lake
- AWS security, AWS Security Hub, AWS CloudTrail, Amazon GuardDuty, Amazon Detective, AWS WAF, AWS Audit Manager, Amazon Fraud Detector, Cloudsploit, AWS Certified Security - Specialty, AWS Security Assurance Services, AWS GDPR, Amazon Inspector, AWS Network Firewall
- AWS compliance: AWS CloudTrail, AWS Audit Manager, AWS Artifact
- AWS, AWS Management & Governance, AWS Organizations, AWS CloudTrail, AWS Control Tower, AWS Resource Access Manager (RAM), AWS Service Catalog, AWS Landing Zone, AWS SSO
Advertising: