AWS Cloud Trail

GPTKB entity

Statements (52)
Predicate Object
gptkbp:instance_of gptkb:server
gptkbp:bfsLayer 3
gptkbp:bfsParent gptkb:football_club
gptkb:microprocessor
gptkb:financial_services_company
gptkb:Company
gptkb:AWS
gptkb:Cloud_Computing_Service
gptkb:seal
gptkb:railway_line
gptkb:server
gptkbp:can_provide forensic investigations
gptkbp:enables compliance auditing
specific AWS services
gptkbp:events gptkb:file_format
gptkbp:facilitates meet compliance requirements
https://www.w3.org/2000/01/rdf-schema#label AWS Cloud Trail
gptkbp:integrates_with gptkb:Company
gptkbp:is_accessible_by gptkb:AWS_Management_Console
AWSCLI
AWSSD Ks
gptkbp:is_available_for free tier usage
gptkbp:is_available_in multiple AWS regions
gptkbp:is_designed_to enhance security posture
gptkbp:is_often_used_in gptkb:financial_services_company
gptkbp:is_part_of AWS Management and Governance services
gptkbp:is_used_by security teams
compliance teams
operations teams
gptkbp:is_used_for security analysis
detect unauthorized access
resource change tracking
track changes to IAM policies
monitor changes to resources
analyze trends in usage
audit AWS account activity
gptkbp:key AWS security best practices
gptkbp:managed_by gptkb:AWS
gptkbp:notable_recordings AWS account activity
gptkbp:offers data integrity validation
gptkbp:provides API call logging
detailed event history
event data for analysis
gptkbp:provides_information_on user activity
gptkbp:services tracks user activity and API usage
provides governance, compliance, and operational and risk auditing.
gptkbp:setting log data events
log management events
log events for specific IAM roles
send logs to Amazon S3
send notifications via Amazon SNS
gptkbp:supports event history