Statements (58)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Cloud_Computing_Service
|
gptkbp:can_be |
CloudWatch alarms
|
gptkbp:canBe |
data events
management events |
gptkbp:compatibleWith |
third-party security tools
|
gptkbp:enables |
compliance auditing
specific_AWS_services |
gptkbp:engineConfiguration |
send_logs_to_Amazon_S3
send_notifications_via_Amazon_SNS |
gptkbp:events |
gptkb:Amazon_RDS
gptkb:Amazon_S3 gptkb:AWS_Lambda gptkb:AWS_CloudFormation gptkb:Amazon_EC2 |
gptkbp:features |
AWS_Governance
|
https://www.w3.org/2000/01/rdf-schema#label |
AWS CloudTrail
|
gptkbp:integration |
gptkb:AWS_Identity_and_Access_Management_(IAM)
|
gptkbp:is_a_subject_of |
AWS_pricing_model
|
gptkbp:is_accessible_by |
gptkb:AWS_Management_Console
gptkb:AWS_CLI AWS_SDKs |
gptkbp:is_available_in |
AWS Free Tier
multiple_AWS_regions |
gptkbp:is_designed_to |
security and compliance purposes
|
gptkbp:is_governed_by |
AWS_service_terms
|
gptkbp:is_integrated_with |
gptkb:AWS_CloudWatch
|
gptkbp:is_monitored_by |
longer than 90 days
|
gptkbp:is_part_of |
AWS_security_services
AWS_management_tools |
gptkbp:is_used_in |
AWS Config
developers security analysis security teams compliance teams operations teams detect unauthorized access investigate security incidents track changes to resources monitor compliance resource change tracking track changes to IAM policies analyze user activity audit API usage detect anomalies in API usage generate compliance reports monitor changes in resource configurations perform forensic analysis track API calls made by services track API calls made by users monitor_AWS_service_usage |
gptkbp:offers |
multi-region trails
|
gptkbp:provides |
API call logging
detailed event information data event logging event history for 90 days by default |
gptkbp:recordings |
AWS_account_activity
|
gptkbp:supports |
event history
log file integrity validation |