Difference between revisions of "AWS CloudTrail Best Practices"
Jump to navigation
Jump to search
Line 13: | Line 13: | ||
== See also == | == See also == | ||
+ | * {{aws cloudtrail}} | ||
* {{CloudTrail}} | * {{CloudTrail}} | ||
[[Category:Cloudtrail]] | [[Category:Cloudtrail]] |
Revision as of 04:51, 11 July 2024
- Enable CloudTrail log file integrity validation
- Receiving CloudTrail log files from multiple accounts
- Enable MFA-delete and versioning on the Amazon S3 Bucket storing log files:
aws_s3_versioning, mfa_delete
Related
See also
aws cloudtrail
[get-event-selectors | lookup-events | list-trails | create-trail | add-tags | delete-trail | describe-trails | get-trail-status | put-event-selectors | put-insight-selectors | remove-tags | start-logging | stop-logging | update-trail | validate-logs | create-event-data-store | list-public-keys | list-tags
], Terraform,enable-federation
,AWS CloudTrail, Events- AWS CloudTrail, AWS CloudTrail Insights, CloudTrail Events, AWS CloudTrail Lake, Terraform, Best practices, Datadog SIEM Content Packs for Cloudtrail
Advertising: