Search⌘ K
AI Features

AWS CloudTrail

Explore AWS CloudTrail to understand how it logs and tracks user and service activities within your AWS account. Learn to distinguish management, data, and insight events, use CloudTrail Event History for recent activity analysis, and configure CloudTrail trails for long-term auditing. Discover how CloudTrail Insights employs AI to detect unusual behavior, aiding security and compliance in cloud operations.

AWS CloudTrail is an AWS tool primarily used for logging any events that represent operations and actions done by users, AWS services, or IAM roles. These logs can be analyzed for monitoring and governing the AWS infrastructure. These events comprise any AWS service or resource actions via the AWS Management Console, AWS CLI, or AWS SDKs and APIs. This makes CloudTrail ideal for auditing, validating compliance standards, identifying security breaches, or troubleshooting any operational issues.

Note: CloudTrail Event History is automatically enabled by default when we create an AWS account without requiring us to perform any steps manually. Any activity that happens within our AWS account gets recorded as a CloudTrail event.

What are CloudTrail events?

A CloudTrail event is any action taken by an AWS user, role, resource, or service within our account. These actions are recorded as events within the logs by CloudTrail. CloudTrail events are of the following types:

  • Management events: Management events represent actions performed on resources within our AWS account. For example, launching an EC2 instance (RunInstances) is considered a management event.

  • Data events: Data events represent object-level actions performed within specific AWS services, like Amazon S3 or ...