AWS CloudTrail

Track user activity and API usage on AWS and in hybrid and multicloud environments


With CloudTrail Lake, you can ingest activity events from AWS and sources outside AWS, including other cloud providers, in-house applications, and SaaS applications running in the cloud or on premises.
In AWS CloudTrail Lake, you can immutably store audit-worthy events. Easily generate audit reports required by internal policies and external regulations.
Detect unauthorized access and analyze activity logs using Amazon Athena or with SQL-based queries, now even easier with natural language query generation (in preview), powered using generative AI, for users with less expertise in writing SQL queries or CloudTrail. Respond with rules-based EventBridge alerts and automated workflows.

Why AWS CloudTrail?

AWS CloudTrail is a service that enables governance, compliance, operational auditing, and auditing of your AWS account.

Use cases

Protect your organization from penalties using CloudTrail logs to prove compliance with regulations such as SOC, PCI, and HIPAA.

Learn more about how CloudTrail works

Improve your security posture by recording user activity and events, and set up automated workflow rules with Amazon EventBridge.

Learn about the CloudTrail integration with Amazon EventBridge

Answer operational questions, facilitate debugging, and investigate issues like rate limiting with SQL-based queries, natural language query generation (in preview), Amazon Athena, or by visualizing trends with dashboards in CloudTrail Lake. 

Learn how to run SQL queries against your event data using Amazon Athena

Explore more of AWS