A meter located in US East (Ohio). Part of Amazon AWS, this devops SKU tracks charges for USE2-PaidEventsRecorded services measured in events. Keep a history of all the activity in an AWS account to meet governance, compliance, and auditing requirements.
|Sub Category||Management Tools - AWS CloudTrail Paid Events Recorded|
|Regions||US East (Ohio)|
AWS CloudTrail1 captures a secure log of all events in an AWS account. It can be used to proactively implement governance controls, automating security responses when non-compliant activities are detected, and reactively support analysis and troubleshooting. Many third-party products integrate with CloudTrail to deliver actionable insights across a cloud estate2.
Key use cases
Security-conscious cloud customers may use CloudTrail as part of a Security Incident and Event Management (SIEM) strategy, to detect, analyze, and mitigate potential threats. Consumers with these concerns are likely to use CloudTrail alongside a other event sources, executing a co-ordinated strategy to provide a holistic view of threats across a compute environment.
Organisations implementing a "service provider" model -- in which a central function delivers cloud services to internal or external parties -- can use CloudTrail to monitor consumer activity. For such organisations, CloudTrail offers an easy opportunity to deliver unique value at scale through pre-packaged rules and alerts tailored to specific market verticals.
Offers relating to this item are currently unavailable.
Currently available in the following AWS regions: US East (Ohio)
AWS CloudTrail - https://aws.amazon.com/cloudtrail/ ↩
CloudTrail partner software and services - https://aws.amazon.com/cloudtrail/partners/ ↩