AWS Cloud Trail

GPTKB entity

Statements (48)
Predicate Object
gptkbp:instance_of gptkb:Amazon_Web_Services
gptkbp:can_be_configured_for log data events
log management events
log events for specific IAM roles
send logs to Amazon S3
send notifications via Amazon SNS
gptkbp:can_be_used_to detect unauthorized access
track changes to IAM policies
monitor changes to resources
analyze trends in usage
audit AWS account activity
gptkbp:can_provide forensic investigations
gptkbp:enables compliance auditing
specific AWS services
gptkbp:facilitates meet compliance requirements
https://www.w3.org/2000/01/rdf-schema#label AWS Cloud Trail
gptkbp:integrates_with gptkb:Identity_and_Access_Management
gptkbp:is_a_key_component_of AWS security best practices
gptkbp:is_accessible_by gptkb:AWS_SDKs
gptkb:AWS_Management_Console
gptkb:AWS_CLI
gptkbp:is_available_for free tier usage
gptkbp:is_available_in multiple AWS regions
gptkbp:is_designed_to enhance security posture
gptkbp:is_managed_by gptkb:AWS
gptkbp:is_often_used_in gptkb:AWS_Cloud_Formation
gptkbp:is_part_of AWS Management and Governance services
gptkbp:is_used_by security teams
compliance teams
operations teams
gptkbp:is_used_for security analysis
resource change tracking
gptkbp:logs_events_in gptkb:JSON_format
gptkbp:offers data integrity validation
gptkbp:provides API call logging
detailed event history
event data for analysis
gptkbp:provides_information_on user activity
gptkbp:record AWS account activity
gptkbp:services tracks user activity and API usage
provides governance, compliance, and operational and risk auditing.
gptkbp:supports event history
gptkbp:bfsParent gptkb:crypt
gptkb:Amazon_Web_Services
gptkb:AWS
gptkb:Identity_and_Access_Management
gptkb:Io_T_solutions
gptkbp:bfsLayer 4