Ensure CloudTrail trails are integrated with CloudWatch Logs


AWS CloudTrail is a web service that records AWS API calls made in a given AWS account. The recorded information includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by the AWS service. CloudTrail uses Amazon S3 for log file storage and delivery, so log files are stored durably. In addition to capturing CloudTrail logs within a specified S3 bucket for long term analysis, realtime analysis can be performed by configuring CloudTrail to send logs to CloudWatch Logs. For a trail that is enabled in all regions in an account, CloudTrail sends log files from all those regions to a CloudWatch Logs log group. It is recommended that CloudTrail logs be sent to CloudWatch Logs.

Note: The intent of this recommendation is to ensure AWS account activity is being captured, monitored, and appropriately alarmed on. CloudWatch Logs is a native way to accomplish this using AWS services but does not preclude the use of an alternate solution.


Perform the following to establish the prescribed state:

Via the AWS management Console

  1. Sign in to the AWS Management Console and open the CloudTrail console
  2. Under All Buckets, click on the target bucket you wish to evaluate
  3. Click Properties on the top right of the console
  4. Click Trails in the left menu
  5. Click on each trail where no CloudWatch Logs are defined
  6. Go to the CloudWatch Logs section and click on Configure
  7. Define a new or select an existing log group
  8. Click on Continue
  9. Configure IAM Role which will deliver CloudTrail events to CloudWatch Logs
    1. Create/Select an IAM Role and Policy Name
    2. Click Allow to continue


aws cloudtrail update-trail –name &lt







We are now live on AWS Marketplace.
The integrated view of your cloud infrastructure is now easier than ever!