AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account.
With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure.
CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. This event history simplifies security analysis, resource change tracking, and troubleshooting.
With AWS CloudTrail, simplify your compliance audits by automatically recording and storing event logs for actions made within your AWS account. Integration with Amazon CloudWatch Logs provides a convenient way to search through log data, identify out-of-compliance events, accelerate incident investigations, and expedite responses to auditor requests.
AWS CloudTrail increases visibility into your user and resource activity by recording AWS Management Console actions and API calls. You can identify which users and accounts called AWS, the source IP address from which the calls were made, and when the calls occurred.
With AWS CloudTrail, you can discover and troubleshoot security and operational issues by capturing a comprehensive history of changes that occurred in your AWS account within a specified period of time.
AWS CloudTrail allows you track and automatically respond to account activity threatening the security of your AWS resources. With Amazon CloudWatch Events integration, you can define workflows that execute when events that can result in security vulnerabilities are detected. For example, you can create a workflow to add a specific policy to an Amazon S3 bucket when CloudTrail logs and API call that makes that bucket public.
AWS CloudTrail makes it easier to ensure compliance with internal policies and regulatory standards by providing a history of activity in your AWS account. For more information, download the AWS compliance whitepaper, “Security at Scale: Logging in AWS.”
You can perform security analysis and detect user behavior patterns by ingesting AWS CloudTrail events into your log management and analytics solutions.
You can detect data exfiltration by collecting activity data on S3 objects through object-level API events recorded in CloudTrail. After the activity data is collected, you can use other AWS services, such as Amazon CloudWatch Events and AWS Lambda, to trigger response procedures.
You can troubleshoot operational issues by leveraging the AWS API call history produced by AWS CloudTrail. For example, you can quickly identify the most recent changes made to resources in your environment, including creation, modification, and deletion of AWS resources (e.g., Amazon EC2 instances, Amazon VPC security groups, and Amazon EBS volumes).
CEO
Since founding Gunner Technology, Cody has served the company in every aspect of business development and product development.
CTO
From a contractor to a partner, Dary has been with Gunner since year 1 and embodies the meritocratic spirit and philosophy of Gunner Technology.
VP / Engineering
Mahdi joined Gunner at age 18 and quickly rose through the ranks to become VP of Engineering
Developer II
From Sensors and Big Data to Media Queries and Form Validation, Elena has worked on pretty much anything you can imagine.
Developer III
Skyla is Gunner's go-to engineer when it comes to evaluating new tech. She loves evaluating bleeding edge software and teaching her colleagues what she learns.
Developer II
Kayden holds the Gunner Technology record for most straight hours worked at just under 70. He refuses to quit until the job is done and it's done right.
DevOps Engineer II
Ethan has a mind for infrastructure and a knack for visualizing platform solutions
DevOps Engineer I
Nicolas' goal is to learn everything. A voracious reader, the only time his nose isn't in a tech book is when he's scripting a new infrastructure.
Amazon Web Services (AWS) is a comprehensive, evolving cloud computing platform provided by Amazon.
The defense of digital information and IT assets against internal and external, malicious and accidental threats.
DevOps is the blending of tasks performed by a company's application development and systems operations teams.