AWS provides various native security logging capabilities that allow customers to monitor and analyze security-related events in their AWS environment.
Here are some of the AWS security logging capabilities:
- AWS CloudTrail: AWS CloudTrail is a service that records all API calls made in an AWS account. CloudTrail can be used to identify the source of a security event, as well as to detect any unauthorized activity in the account. CloudTrail provides a comprehensive history of all API calls made in the account, including the identity of the caller, the time of the call, and the parameters passed to the API.
- Amazon GuardDuty: Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity in an AWS account. GuardDuty analyzes data from various sources, such as VPC flow logs, DNS logs, and CloudTrail, to identify potential threats, such as unauthorized access and data exfiltration.
- Amazon VPC Flow Logs: Amazon VPC Flow Logs is a feature that enables users to capture information about the IP traffic going to and from network interfaces in an Amazon Virtual Private Cloud (VPC). VPC Flow Logs can be used to monitor network traffic and detect security threats, such as unauthorized access attempts and malware infections.
- AWS Config: AWS Config is a service that provides a detailed inventory of AWS resources in an account, as well as the relationships between those resources. AWS Config can be used to monitor changes in resource configurations, such as changes to security groups and network ACLs, which can be an indication of a security event.
- AWS WAF Logs: AWS WAF Logs is a feature that allows users to capture information about HTTP and HTTPS requests that are forwarded to an AWS WAF web ACL. WAF Logs can be used to monitor web traffic and detect security threats, such as SQL injection attacks and cross-site scripting (XSS) attacks.