What is AWS CloudTrail?
A service that provides a history of AWS API calls for your account.
enables governance, compliance, operational auditing, and risk auditing of your AWS environment.
What are the three categories of events recorded by CloudTrail?
In CloudTrail,
What are Management Events?
API calls related to resource management
Think control plane
Enabled by default.
e.g., RunInstance for EC2, CreateBucket for S3, AttachRolePolicy for IAM).
In CloudTrail
What are Data Events?
Events related to data access/usage on a resource
Think data plane
Disabled by default (must be explicitly enabled).
(e.g., S3 object-level APIs like GetObject, Lambda function execution).
What is the default retention period for CloudTrail event history in the console?
90 days (Management Events only).
Where must you store CloudTrail logs for long-term retention and analysis beyond the default retention period?
An S3 bucket.
How can you ensure the integrity and non-repudiation of CloudTrail logs in S3?
Enable file integrity validation on the trail.
using hashing and digital signatures
How do you get a single, consolidated view of all API activity across all AWS Regions and all accounts in an AWS Organization?
Configure a multi-region trail and enable it for the entire AWS Organization (using Organizations).
Which AWS service is best used to query and analyze CloudTrail logs stored in the S3 bucket?
Amazon Athena (or Amazon QuickSight for visualization).
If you disable CloudTrail, will existing S3 CloudTrail logs be deleted?
No
A developer needs to track the history of configuration changes (e.g., security group modifications) for an EC2 instance for auditing and compliance. Which AWS service should be used?
AWS Config
CloudTrail records API calls (who did what, when) but doesn’t track configuration changes over time