AWS - IAM
Introduction to AWS Identity and Access Management
Auditing with CloudTrail
In this lesson, you’ll learn how to track and audit S3 access using AWS CloudTrail. When an IAM user performs actions—like deleting an object in an S3 bucket—you need to know who did it, when it happened, and exactly which operation was called. AWS CloudTrail records all API calls to your AWS resources, making this audit process straightforward.
Note
Make sure CloudTrail is enabled across all regions before you begin so that no API activity goes unrecorded.
Why Audit S3 Access?
By analyzing CloudTrail logs, you can:
Feature | Description |
---|---|
API call logging | Capture every AWS API request, whether from users, services, or resources. |
Action auditing | Review who performed which operations on your resources. |
API call tracking | Filter logs by IAM users, resources, or specific event names. |
Security event detection | Identify both successful and failed login attempts. |
Demo: Use CloudTrail to Audit User Access
Follow these steps to search the event history in the CloudTrail console:
- Sign in to the AWS Management Console and open CloudTrail.
- In the sidebar, select Event history.
- Use the filter bar to narrow down by Event name, Username, or Resource name.
- Click an individual event to view details such as the request time, source IP, and whether the request succeeded or failed.
References
Watch Video
Watch video content