Difference between revisions of "AWS CloudTrail"
Jump to navigation
Jump to search
↑ https://aws.amazon.com/es/about-aws/whats-new/2013/11/13/announcing-aws-cloudtrail/
↑ https://aws.amazon.com/cloudtrail/faqs/#Event_payload.2C_timeliness.2C_and_delivery_frequency
↑ https://aws.amazon.com/blogs/aws/announcing-cloudtrail-insights-identify-and-respond-to-unusual-api-activity/
Tags: Mobile web edit, Mobile edit |
|||
Line 15: | Line 15: | ||
* [[IAM Access Analyzer]] | * [[IAM Access Analyzer]] | ||
* [[AWS CloudTrail Insights]] (Noviembre 2019)<ref>https://aws.amazon.com/blogs/aws/announcing-cloudtrail-insights-identify-and-respond-to-unusual-api-activity/</ref> | * [[AWS CloudTrail Insights]] (Noviembre 2019)<ref>https://aws.amazon.com/blogs/aws/announcing-cloudtrail-insights-identify-and-respond-to-unusual-api-activity/</ref> | ||
− | * [[Governance]] | + | * [[Governance]], [[Compliance]] |
− | |||
* [[FedRAMP]] and [[PCI-DSS]] | * [[FedRAMP]] and [[PCI-DSS]] | ||
Revision as of 17:49, 8 August 2021
AWS CloudTrail[1] (2013) is a web service that records API calls made on your account and delivers log files to your AWS S3 bucket every 5 minutes[2]. Third party products such as CloudCheckr and Splunk can help you to analyze logs.
- Management events: Free
- Data events: 0.10 per 100,000 data events delivered
Activities
Related terms
- Amazon GuardDuty
- AWS Security Hub
- Amazon Detective
- AWS Config
- Elastic SIEM
- IAM Access Analyzer
- AWS CloudTrail Insights (Noviembre 2019)[3]
- Governance, Compliance
- FedRAMP and PCI-DSS
See also
- Audit:
acct
,atop
,tripwire
,AIDE
,auditd
,debsums
, AWS Cloudtrail,logwatch
,logcheck
, Google Santa, Coguard - Linux logging, Cisco IOS logging
- AWS CloudTrail, AWS CloudTrail Insights, CloudTrail Events, AWS CloudTrail Lake, Terraform, Best practices, Datadog SIEM Content Packs for Cloudtrail
Advertising: