Statements (56)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:railway_line
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:Cloud_Computing_Service
|
gptkbp:can_provide |
forensic investigations
|
gptkbp:enables |
compliance auditing
specific AWS accounts |
gptkbp:events |
gptkb:aircraft
AWS services Amazon E C2 |
gptkbp:features |
gptkb:AWS_Security_Hub
|
https://www.w3.org/2000/01/rdf-schema#label |
Cloud Trail
|
gptkbp:integrates_with |
gptkb:AWS_Management_Console
|
gptkbp:is_a_tool_for |
cloud security monitoring
|
gptkbp:is_accessible_by |
AWSCLI
|
gptkbp:is_available_in |
multiple AWS regions
|
gptkbp:is_designed_to |
enhance security posture
|
gptkbp:is_essential_for |
regulatory compliance
risk management data protection incident response cloud governance |
gptkbp:is_integrated_with |
third-party tools
|
gptkbp:is_often_used_in |
gptkb:financial_services_company
|
gptkbp:is_part_of |
AWS Cloud Compliance
AWS Cloud Trail Lake |
gptkbp:is_used_for |
security analysis
analyze user behavior audit changes to IAM policies detect anomalies in usage patterns detect unauthorized access ensure accountability in cloud operations track changes to resources support incident investigations monitor API calls made by users. monitor changes to security groups track changes to VPC configurations |
gptkbp:is_used_to |
monitor API usage
track resource changes |
gptkbp:key |
AWS security architecture
|
gptkbp:managed_by |
gptkb:AWS_Management_Console
|
gptkbp:notable_recordings |
AWS account activity
|
gptkbp:provides |
API call logging
detailed event logs event history for 90 days |
gptkbp:provides_information_on |
user activity
|
gptkbp:services |
captures API calls
helps in compliance reporting provides visibility into AWS account activity |
gptkbp:session |
gptkb:Amazon_S3
|
gptkbp:setting |
event history
log management events send notifications via SNS log data events for S3 |
gptkbp:supports |
multi-region logging
data event logging |
gptkbp:trigger_type |
AWS Lambda functions
|