AWS::CloudTrail::Trail
- Focused on
auditing
, governance
and compliance
of AWS account activity
- Provides a history of
who did what, when, and from where
within your AWS environment.
- History of all events and API calls in the account (console, sdk, cli)

Events Retention
- Events are stored for
90 days
- To keep events beyond this period, log them to S3 using
trails

Properties
Type: AWS::CloudTrail::Trail
Properties:
AdvancedEventSelectors:
- AdvancedEventSelector
CloudWatchLogsLogGroupArn: String
CloudWatchLogsRoleArn: String
EnableLogFileValidation: Boolean
EventSelectors:
- EventSelector
IncludeGlobalServiceEvents: Boolean
InsightSelectors:
- InsightSelector
IsLogging: Boolean
IsMultiRegionTrail: Boolean
IsOrganizationTrail: Boolean
KMSKeyId: String
S3BucketName: String
S3KeyPrefix: String
SnsTopicName: String
Tags:
- Tag
TrailName: String
EventSelectors
Management Events
: operations on aws resources (e.g., configure iam, configure vpc) - Read or Write events
Data Events
: data from aws resources (e.g., s3 object activity, lambda executions)
Cloudtrail Insights Events
: detect unusual write activities in the account (e.g., hittings service limits, bursts iam actions)
InsightSelectors
Cloudtrail Insights
detects unusual activities

S3BucketName
Trail
is a policy to save events to an s3 bucket
and cloudwatch
- You choose the events to store (management, data(lambda, s3, etc), insights)
Filter
events by attributes (e.g., only write events)