Statements (52)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:server
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:football_club
gptkb:microprocessor gptkb:financial_services_company gptkb:Company gptkb:AWS gptkb:Cloud_Computing_Service gptkb:seal gptkb:railway_line gptkb:server |
gptkbp:can_provide |
forensic investigations
|
gptkbp:enables |
compliance auditing
specific AWS services |
gptkbp:events |
gptkb:file_format
|
gptkbp:facilitates |
meet compliance requirements
|
https://www.w3.org/2000/01/rdf-schema#label |
AWS Cloud Trail
|
gptkbp:integrates_with |
gptkb:Company
|
gptkbp:is_accessible_by |
gptkb:AWS_Management_Console
AWSCLI AWSSD Ks |
gptkbp:is_available_for |
free tier usage
|
gptkbp:is_available_in |
multiple AWS regions
|
gptkbp:is_designed_to |
enhance security posture
|
gptkbp:is_often_used_in |
gptkb:financial_services_company
|
gptkbp:is_part_of |
AWS Management and Governance services
|
gptkbp:is_used_by |
security teams
compliance teams operations teams |
gptkbp:is_used_for |
security analysis
detect unauthorized access resource change tracking track changes to IAM policies monitor changes to resources analyze trends in usage audit AWS account activity |
gptkbp:key |
AWS security best practices
|
gptkbp:managed_by |
gptkb:AWS
|
gptkbp:notable_recordings |
AWS account activity
|
gptkbp:offers |
data integrity validation
|
gptkbp:provides |
API call logging
detailed event history event data for analysis |
gptkbp:provides_information_on |
user activity
|
gptkbp:services |
tracks user activity and API usage
provides governance, compliance, and operational and risk auditing. |
gptkbp:setting |
log data events
log management events log events for specific IAM roles send logs to Amazon S3 send notifications via Amazon SNS |
gptkbp:supports |
event history
|