Protect your organization from penalties using CloudTrail logs to prove compliance with regulations such as SOC, PCI, and HIPAA.
Improve your security posture by recording user activity and events, and set up automated workflow rules with Amazon EventBridge.
Capture and consolidate user activity and API usage across AWS Regions and accounts on a single, centrally controlled platform.
How it works
Monitor, store, and validate activity events for authenticity. Easily generate audit reports required by internal policies and external regulations.
Identify security incidents
Detect unauthorized access using the Who, What, and When information in CloudTrail Events. Respond with rules-based EventBridge alerts and automated workflows.
Troubleshoot operational issues
Continuously monitor API usage history using machine learning (ML) models to spot unusual activity in your AWS accounts, and determine root cause.
How to get started
Explore AWS CloudTrail features
Learn how to log, continuously monitor, and retain account activity related to actions across your AWS infrastructure.
Try the AWS Free Tier
Get one copy of ongoing management events delivered and the most recent 90-day event history and pay nothing.
Connect with an expert
Get answers to all your CloudTrail questions.