AVC
AWS Management & Governance
AWS CloudTrail
AWS CloudTrail
Track user activity and API usage
2021
AWS re:Invent 2020: A security operator’s guide to practical AWS CloudTrail analysis
How can I change my CloudTrail trail to an AWS Organization trail?
2020
6:08
Visualize AWS CloudTrail Logs in Kibana Using Amazon Elasticsearch Service
6:08
7:11
Why did my CloudTrail cost and usage increase unexpectedly?
7:11
9:46
Monitor AWS CloudTrail Log Data in Amazon CloudWatch
9:46
3:15
Monitor Unusual Activity in AWS Accounts Using CloudTrail Insights
3:15
6:05
Solving with AWS Solutions: Centralized Logging
6:05
16:24
AWS re:Invent 2019 Launchpad | Cloudtrail Insights
16:24
2019
34:59
AWS re:Invent 2019: Actionable threat hunting in AWS (SEC339)
34:59
34:19
AWS re:Invent 2019: Monitoring anomalous application behavior (NFX205)
34:19
57:15
AWS re:Invent 2019: [REPEAT 2] The fundamentals of AWS cloud security (SEC205-R2)
57:15
1:31
AWS CloudTrail: Simplify Security Analysis, Resource Change Tracking, and Troubleshooting
1:31
5:35
Why can't I find the user name that created an EBS volume by searching CloudTrail?
5:35
6:12
How can I use CloudTrail to review what API calls and actions have occured in my AWS account?
6:12
1:26
How do I search for IAM access key activity using the CloudTrail console?
1:26
2018
58:38
AWS re:Invent 2018: Augmenting Security & Improving Operational Health w/ AWS CloudTrail (SEC323)
58:38
3:48
How do I search CloudTrail logs using Amazon Athena?
3:48
2017
16:27
AWS re:Invent Launchpad 2017 - Announcement: CloudTrail Support for Lambda Invoke API Activity
16:27
52:42
AWS re:Invent 2017: Using AWS CloudTrail to Enhance Governance and Compliance of Ama (DEV311)
52:42
1:35
What's New with AWS - Week of September 29, 2017
1:35
57
AWS Summit Series 2017 – New York: AWS CloudTrail Event History Available to All Customers
57
1:30
AWS CloudTrail Event History is Now Available to All Customers
1:30
3:41
Querying AWS CloudTrail logs with Amazon Athena
3:41
3:31
AWS Audit and Access Logging for Education
3:31
1:56
Coinbase: High Security IAM at Speed with AWS
1:56
2016
Why are my CloudTrail logs showing root credentials in use for API actions I didn't initiate?
2015
50:25
AWS re:Invent 2015 | (SEC403) Diving into AWS CloudTrail Events w/Apache Spark on EMR
50:25
37:29
AWS re:Invent 2015 | (SEC318) AWS CloudTrail Deep Dive
37:29
2014
40:31
AWS re:Invent 2014 | (SEC306) Turn on CloudTrail: Log API Activity in Your AWS Account
40:31
2013
41:37
AWS CloudTrail to Track AWS Resources in Your Account (SEC207) | AWS re:Invent 2013
41:37