AWS CloudTrail

AWS CloudTrail is a service that provides governance, compliance and operational and risk auditing for your AWS account. Events include actions taken in the AWS Management Console, AWS Command Line Interface, and AWS SDKs and APIs.

Prerequisites
  • AWS Access key
  • AWS Secret key
  • AWS Region
How to Derive the Prerequisites
  • Go to the IAM Dashboard – In the search bar, type IAM and select the IAM service.




  • Create a New User
    • Under Access management, click on Users. 
    • Click on Add users. 
    • Provide a User name (e.g., cloudtrail-dnif-user).






  • Assign Permissions – Choose one of the following options
    • Attach policies directly : Select policy CloudTrailReadOnlyAccess, which is depending on the required access.
    • Copy permissions from existing user : Use an existing user with the desired permissions.



  • Review and Create – Review the configurations and click Create user.



  • Download the Access Key – After the user is created, you’ll see the Access key ID and Secret access key. – Click Download .csv to save these credentials securely.
  • Note: You won’t be able to view the Secret Access Key again, so ensure you download or copy it securely.
Configurations


Use the following fields to configure the AWS CloudTrail Connector in DNIF:

FieldDescription
Connector NameProvide a name for the connector.
AWS Access KeyEnter the Access Key for the respective being used for signing in.
AWS Secret KeyEnter the Secret Key generated for the selected user.
AWS RegionEnter the specific AWS region for which you want to fetch the logs
  • Click Save after entering all the required details and click Test Connection, to test the configuration.
  • A Connection successful message will be displayed on screen along with the time stamp.