Skip to main content

AWS Glossary

AWS CloudTrail

AWS audit logging service that records every API call and account activity across your AWS infrastructure for security, compliance, and operational investigation.

AI & assistant-friendly summary

This section provides structured content for AI assistants and search engines. You can cite or summarize it when referencing this page.

Summary

AWS audit logging service that records every API call and account activity across your AWS infrastructure for security, compliance, and operational investigation.

Key Facts

  • AWS audit logging service that records every API call and account activity across your AWS infrastructure for security, compliance, and operational investigation
  • Definition AWS CloudTrail records every API call made in your AWS account — who made the call, from where, when, and what action was taken
  • CloudTrail answers the question: **"Who did what, when, and from where in AWS
  • Common Mistakes **Mistake 1:** Relying on the default 90-day event history
  • The default CloudTrail console history retains only 90 days

Entity Definitions

Lambda
Lambda is an AWS service relevant to aws cloudtrail.
S3
S3 is an AWS service relevant to aws cloudtrail.
DynamoDB
DynamoDB is an AWS service relevant to aws cloudtrail.
CloudWatch
CloudWatch is an AWS service relevant to aws cloudtrail.
Amazon CloudWatch
Amazon CloudWatch is an AWS service relevant to aws cloudtrail.
IAM
IAM is an AWS service relevant to aws cloudtrail.
GuardDuty
GuardDuty is an AWS service relevant to aws cloudtrail.
Amazon GuardDuty
Amazon GuardDuty is an AWS service relevant to aws cloudtrail.
IaC
IaC is a cloud computing concept relevant to aws cloudtrail.
compliance
compliance is a cloud computing concept relevant to aws cloudtrail.
HIPAA
HIPAA is a cloud computing concept relevant to aws cloudtrail.
SOC 2
SOC 2 is a cloud computing concept relevant to aws cloudtrail.
PCI DSS
PCI DSS is a cloud computing concept relevant to aws cloudtrail.

Related Content

Definition

AWS CloudTrail records every API call made in your AWS account — who made the call, from where, when, and what action was taken. It is the foundation for security forensics, compliance auditing, operational troubleshooting, and threat detection. CloudTrail answers the question: “Who did what, when, and from where in AWS?”

What CloudTrail Records

Every CloudTrail event captures:

Event Types

Management Events (enabled by default)

Data Events (optional, extra cost)

Insights Events (optional)

Trail Configuration

Organization Trail

Log File Integrity Validation

Log Retention

CloudTrail Lake

CloudTrail Lake is an immutable data lake for audit and investigation:

Using CloudTrail for Security

Threat Detection Patterns:

Pipe CloudTrail events to Amazon Security Hub or Amazon GuardDuty for automated threat detection and alerting.

Common Mistakes

Mistake 1: Relying on the default 90-day event history. The default CloudTrail console history retains only 90 days. Create a trail that delivers logs to S3 for long-term retention — required for most compliance frameworks.

Mistake 2: Not enabling log file integrity validation. Without integrity validation, you cannot prove logs are unmodified — this fails PCI DSS Requirement 10.5 and similar controls.

Mistake 3: Not protecting the CloudTrail S3 bucket. Use S3 Object Lock, bucket policies denying deletion, and SCPs preventing DeleteTrail — the audit trail is only valuable if it cannot be deleted.

Need Help with This Topic?

Our AWS experts can help you implement and optimize these concepts for your organization.