Management Tools | AWS CloudTrail Flashcards
What is AWS CloudTrail?
General
AWS CloudTrail | Management Tools
AWS CloudTrail is a web service that records activity made on your account and delivers log files to your Amazon S3 bucket.
What are the benefits of CloudTrail?
General
AWS CloudTrail | Management Tools
CloudTrail provides visibility into user activity by recording actions taken on your account. CloudTrail records important information about each action, including who made the request, the services used, the actions performed, parameters for the actions, and the response elements returned by the AWS service. This information helps you to track changes made to your AWS resources and to troubleshoot operational issues. CloudTrail makes it easier to ensure compliance with internal policies and regulatory standards. For more details, refer to the AWS compliance white paper “Security at scale: Logging in AWS”.
Who should use CloudTrail?
Getting Started
AWS CloudTrail | Management Tools
Customers who need to track changes to resources, answer simple questions about user activity, demonstrate compliance, troubleshoot, or perform security analysis should use CloudTrail.
If I am a new AWS customer or existing AWS customer and don’t have CloudTrail setup, do I need to enable or setup anything to view my account activity?
Getting Started
AWS CloudTrail | Management Tools
No, nothing is required to begin viewing your account activity. You can visit the AWS CloudTrail console or AWS CLI and begin viewing up to the past 90 days of account activity.
Does the CloudTrail Event History show all account activity within my account?
Getting Started
AWS CloudTrail | Management Tools
AWS CloudTrail will only show the results of the CloudTrail Event History for the current region you are viewing for the last 90 days and support the AWS services found here. These events are limited to management events with create, modify, and delete API calls and account activity. For a complete record of account activity, including all management events, data events, and read-only activity, you’ll need to configure a CloudTrail trail.
What search filters can I use to view my account activity?
Getting Started
AWS CloudTrail | Management Tools
You can specify Time range and one of the following attributes: Event name, User name, Resource name, Event source, Event ID, and Resource type.
Can I use the lookup-events CLI command even if I don’t have a trail configured?
Getting Started
AWS CloudTrail | Management Tools
Yes, you can visit the CloudTrail console or use the CloudTrail API/CLI and begin viewing the past 90 days of account activity.
What additional CloudTrail features are available by setting up CloudTrail and creating a trail?
Getting Started
AWS CloudTrail | Management Tools
By setting up a CloudTrail trail you can deliver your CloudTrail events to Amazon S3, Amazon CloudWatch Logs, and Amazon CloudWatch Events. This enables you to leverage features to help you archive, analyze, and respond to changes in your AWS resources.
Can I restrict access for users in my account from seeing the CloudTrail Event History?
Getting Started
AWS CloudTrail | Management Tools
Yes, CloudTrail integrates with AWS Identity and Access Management (IAM), which allows you to control access to CloudTrail and to other AWS resources that CloudTrail requires, including the ability to restrict permissions to view and search account activity. This is accomplished by removing the “cloudtrail:LookupEvents” from the Users IAM policy which will then prevent that IAM user from viewing account activity.
Is there any cost associated with CloudTrail Event History being enabled on my account upon creation?
Getting Started
AWS CloudTrail | Management Tools
There is no cost for viewing or searching account activity with CloudTrail Event History.
Can I turn CloudTrail Event History off for my account?
Services and Region Support
AWS CloudTrail | Management Tools
For any CloudTrail trails that you have created, you can stop logging or delete the trails which will also stop the delivery of account activity to the S3 bucket you had designated as part of your trail configuration as well as delivery to CloudWatch Logs if configured. Account activity for the past 90 days will still be collected and visible within the CloudTrail console and through the AWS CLI.
What services are supported by CloudTrail?
Services and Region Support
AWS CloudTrail | Management Tools
AWS CloudTrail records account activity and service events from most AWS services. For the list of supported services, see CloudTrail Supported Services in the CloudTrail User Guide.
Are API calls made from the AWS Management Console recorded?
Services and Region Support
AWS CloudTrail | Management Tools
Yes. CloudTrail records API calls made from any client. The AWS Management Console, AWS SDKs, command line tools, and higher level AWS services call AWS APIs, so these calls are recorded.
Where are my log files stored and processed before they are delivered to my Amazon S3 bucket?
Applying a Trail to all Regions
AWS CloudTrail | Management Tools
Activity information for services with regional end points (EC2, RDS etc.) is captured and processed in the same region as to which the action is made and delivered to the region associated with your Amazon S3 bucket. Action information for services with single end points (IAM, STS, etc.) is captured in the region where the end point is located, processed in the region where the CloudTrail trail is configured and delivered to the region associated with your Amazon S3 bucket.
What is applying a trail to all regions?
Applying a Trail to all Regions
AWS CloudTrail | Management Tools
Applying a trail to all regions refers to creating a trail that will record AWS account activity in all regions. This setting also applies to any new regions that are added. For more details on regions and partitions, refer to the Amazon Resource Names and AWS Service Namespaces page.
What are the benefits of applying a trail to all regions?
Applying a Trail to all Regions
AWS CloudTrail | Management Tools
You can create and manage a trail across all regions in the partition in one API call or few clicks. You will receive a record of account activity made in your AWS account across all regions to one S3 bucket or CloudWatch logs log group. When AWS launches a new region, you will receive the log files containing event history for the new region without taking any action.
How do I apply a trail to all regions?
Applying a Trail to all Regions
AWS CloudTrail | Management Tools
In the CloudTrail console, you select yes to apply to all regions in the trail configuration page. If you are using the SDKs or AWS CLI, You set the IsMultiRegionTrail to true.
What happens when I apply a trail to all regions?
Applying a Trail to all Regions
AWS CloudTrail | Management Tools
Once you apply a trail in all regions, CloudTrail will create a new trail in all regions by replicating the trail configuration. CloudTrail will record and process the log files in each region and will deliver log files containing account activity across all AWS regions to a single S3 bucket and a single CloudWatch Logs log group. If you specified an optional SNS topic, CloudTrail will deliver SNS notifications for all log files delivered to a single SNS topic.
Can I apply an existing trail to all regions?
Applying a Trail to all Regions
AWS CloudTrail | Management Tools
Yes. You can apply an existing trail to all regions. When you apply an existing trail to all regions, CloudTrail will create a new trail for you in all regions. If you previously created trails in other regions, you can view, edit and delete those trails from the CloudTrail console.
How long will it take for CloudTrail to replicate the trail configuration to all regions?
Multiple Trails
AWS CloudTrail | Management Tools
Typically, it will take less than 30 seconds to replicate the trail configuration to all regions.
How many trails can I create in an AWS region?
Multiple Trails
AWS CloudTrail | Management Tools
You can create up to five trails in an AWS region. A trail that applies to all regions exists in each region and is counted as one trail in each region.
What is the benefit of creating multiple trails in an AWS region?
Multiple Trails
AWS CloudTrail | Management Tools
With multiple trails, different stakeholders such as security administrators, software developers and IT auditors can create and manage their own trails. For example, a security administrator can create a trail that applies to all regions and configure encryption using one KMS key. A developer can create a trail that applies to one region for troubleshooting operational issues.
Does CloudTrail support resource level permissions?
Security and Expiration
AWS CloudTrail | Management Tools
Yes. Using resource level permissions, you can write granular access control policies to allow or deny access to specific users for a particular trail. For more details, go to CloudTrail documentation.
How can I secure my CloudTrail log files?
Security and Expiration
AWS CloudTrail | Management Tools
By default, CloudTrail log files are encrypted using S3 Server Side Encryption (SSE) and placed into your S3 bucket. You can control access to log files by applying IAM or S3 bucket policies. You can add an additional layer of security by enabling S3 Multi Factor Authentication (MFA) Delete on your S3 bucket. For more details on creating and updating a trail, see the CloudTrail documentation.