Posted at, Wed Aug 29 2018
Track user activity and API usage
Monitor Unusual Activity in AWS Accounts Using CloudTrail Insights
Solving with AWS Solutions: Centralized Logging
AWS re:Invent 2019 Launchpad | Cloudtrail Insights
AWS re:Invent 2019: Actionable threat hunting in AWS (SEC339)
AWS re:Invent 2019: [REPEAT 2] The fundamentals of AWS cloud security (SEC205-R2)
AWS CloudTrail: Simplify Security Analysis, Resource Change Tracking, and Troubleshooting
Why can't I find the user name that created an EBS volume by searching CloudTrail?
How can I use CloudTrail to review what API calls and actions have occured in my AWS account?
How do I search for IAM access key activity using the CloudTrail console?
AWS re:Invent 2018: Augmenting Security & Improving Operational Health w/ AWS CloudTrail (SEC323)
How do I search CloudTrail logs using Amazon Athena?
AWS re:Invent Launchpad 2017 - Announcement: CloudTrail Support for Lambda Invoke API Activity
AWS re:Invent 2017: Using AWS CloudTrail to Enhance Governance and Compliance of Ama (DEV311)
AWS Summit Series 2017 – New York: AWS CloudTrail Event History Available to All Customers
AWS CloudTrail Event History is Now Available to All Customers
Querying AWS CloudTrail logs with Amazon Athena
Why are my CloudTrail logs showing root credentials in use for API actions I didn't initiate?
AWS re:Invent 2015 | (SEC403) Diving into AWS CloudTrail Events w/Apache Spark on EMR
AWS re:Invent 2015 | (SEC318) AWS CloudTrail Deep Dive
AWS re:Invent 2014 | (SEC306) Turn on CloudTrail: Log API Activity in Your AWS Account
AWS CloudTrail to Track AWS Resources in Your Account (SEC207) | AWS re:Invent 2013
Est.2016, Copr. 0x4447™ LLC.
Terms of Service