AWS CloudTrail
Track user activity and API usage on AWS and in hybrid and multicloud environments
Benefits
Aggregate and consolidate multisource events
Immutably store audit-worthy events
Derive insights and analyze unusual activity
Detect unauthorized access and analyze activity logs using Amazon Athena or with SQL-based queries, now even easier with natural language query generation, powered using generative AI, for users with less expertise in writing SQL queries. You can also enhance analysis of your AWS activity logs by enriching CloudTrail events with contextual information such as resource tags and AWS global condition keys, and use this information to easily categorize, search and analyze your AWS activity based on your business context.
Why CloudTrail?
Use cases
Compliance & auditing
Protect your organization from penalties using CloudTrail logs to prove compliance with regulations such as SOC, PCI, and HIPAA.
Security
Improve your security posture by recording user and API activity in your AWS accounts. You can also enhance your data perimeter with network activity events for VPC endpoints.
Operations
Answer operational questions, facilitate debugging, and investigate issues using SQL-based queries, natural language query generation, or Amazon Athena. Summarize query results by turning on the AI-powered query result summarization feature (in preview), further streamlining your investigations. Visualize trends with dashboards in CloudTrail Lake.
Learn how to run SQL queries against your event data using Amazon Athena
Did you find what you were looking for today?
Let us know so we can improve the quality of the content on our pages