AWS CloudTrail is a service which allows governance, compliance, operational auditing, and risk auditing of
your AWS account. You can record, constantly check, and maintain account actions associated to actions over your AWS infrastructure with the AWS CloudTrail. AWS CloudTrail gives event record of your AWS account actions, covering actions performed via the AWS Management Console, AWS SDKs, command line tools, and other AWS services and also, this event record clarifies security analysis, resource change tracking, and troubleshooting.
AWS CloudTrail records AWS Management Console actions & API calls that implies enlarge visibility in your user and resource actions and this helps to find which users and accounts invoked AWS. Within one account, you can build, handle and execute AWS CloudTrail track over an Organization. With the combination of AWS CloudTrail and AWS Organizations, this organization track allows you to describe a consistent event recording plan for your organization which is implemented by default to every member account in organization.
By default, AWS CloudTrail clones the track definition to every member account on building and reproduces the modifications to the member account when the track in master account is updated. With the help of organization’s master account, you can frame a track and dot it for execution over the member accounts organization tracks and record them in same Amazon S3 bucket like described by the organization track in the master account.
This service is accessible in the Asia Pacific (Mumbai), Asia Pacific (Osaka-Local), Asia Pacific (Seoul), Asia Pacific
(Singapore), Asia Pacific (Sydney), Asia Pacific (Tokyo), Canada (Central), EU (Frankfort), EU (Ireland), EU (London), EU (Paris), South America (Sao Paulo), US East (N. Virginia), US East (Ohio), US West (N. California), and US West (Oregon) AWS Regions.
No comments:
Post a Comment