Control: AWS > Turbot > Audit Trail
Configure the Guardrails Audit Trail stack.
This stack configures an AWS CloudTrail which can log, continuously monitor, and record account activity.
Resource Types
This control targets the following resource types:
Primary Policies
The following policies can be used to configure this control:
- Audit Trail
- Audit Trail > CloudTrail
- Audit Trail > Source
- Audit Trail > Terraform Version
- Audit Trail > CloudTrail > Trail
- Audit Trail > CloudTrail > Trail > Name Prefix
- Audit Trail > CloudTrail > Trail > S3 Bucket
- Audit Trail > CloudTrail > Trail > CloudWatch Role
- Audit Trail > CloudTrail > Trail > Enabled
- Audit Trail > CloudTrail > Trail > Encryption Key
- Audit Trail > CloudTrail > Trail > Event Selectors
- Audit Trail > CloudTrail > Trail > Global Region
- Audit Trail > CloudTrail > Trail > Include Global Service Events
- Audit Trail > CloudTrail > Trail > S3 Key Prefix
- Audit Trail > CloudTrail > Trail > Log File Validation
- Audit Trail > CloudTrail > Trail > Name
- Audit Trail > CloudTrail > Trail > SNS Topic
- Audit Trail > CloudTrail > Trail > Tags
- Audit Trail > CloudTrail > Trail > Type
Category
In Your Workspace
Developers
- tmod:@turbot/aws#/control/types/auditTrail
- tmod:@turbot/turbot#/control/categories/resourceLogging
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws#/control/types/auditTrail"
Get Controls
Control Type URI
Category URI
GraphQL
CLI