AWS CloudTrail for Auditing

Learn how AWS CloudTrail helps monitor, audit, and analyze user and service activity across the AWS environment with event history, custom trails, and advanced insights.

AWS CloudTrail is a service that records AWS account activity by logging API calls made through the console, SDKs, CLI, or other services. It provides a history of events such as user logins, resource changes, and service access, helping with security auditing, compliance, and troubleshooting.

Press + to interact

CloudTrail events

Any activity within our AWS account is recorded as a CloudTrail event. CloudTrail event history is automatically enabled by default when we create an AWS account, so we do not need to perform any steps manually.

CloudTrail events are of the following types:

  • Management events: Management events represent actions performed on resources within our AWS account. For example, launching an EC2 instance (RunInstances) is considered a management event.

  • Data events: Data events represent object-level actions performed within specific AWS services, like Amazon S3 or AWS Lambda. For example, uploading an object (PutObject) or deleting an object (DeleteObject) in an S3 bucket are considered data events, as these are actions related to the S3 object. In retrospect, creating an S3 bucket (CreateBucket) itself is a management event, as we’re not performing any action within a resource, but actually, the action is to create a resource. ...