Usecase Universe

A collective of use cases for DevOps teams

Browse a variety of 200+ predefined templates to automate all your AWS actions

Create Template
Solutions
All Categories

CloudTrail

24 Times Used
22 MAY 2019
CloudTrail S3 Bucket Logging Enabled
Security
Security
S3
CloudTrail

Sends a report of CloudTrail Trails whose S3 bucket does not have "Bucket Logging" enabled. With Server Access Logging feature enabled for your S3 buckets you can track any requests made to access the buckets and use the log data to take measures in order to protect them against unauthorized user access.

AWS Config Compliance rules Changes
Operational Excellence
CloudTrail
Config

Send report of all the AWS config changes in your AWS account i.e. if any operations like create/delete config rule is performed in your AWS account then this workflow will generate a report of it and send it to your email.

Enable S3 Log File Validation for AWS CloudTrail
S3
CloudTrail
Security

This feature will enable you to verify the integrity of your CloudTrail log files and determine whether the files have been changed after they have been delivered to the selected S3 bucket. The validation of log file integrity uses industry-standard algorithms such as SHA-256 which makes it impossible to change files without detection.

Notify if AWS CloudTrail is not Enabled
AWS Best Practices
CloudTrail
Security
AWS Best Practices
Security

AWS CloudTrail can help you achieve compliance and improve security by logging API calls and changes to your cloud resources.

CloudTrail multi-region logging
CloudTrail
Security

Global tracking of your AWS API Calls will assist you to better manage your AWS account and your infrastructure security.

Network Change Events
CloudTrail
Network
Operational Excellence
CloudTrail

Send report of all the network changes in your AWS account i.e. if any operations like create/delete Route/RouteTable is performed in your AWS account then this workflow will generate a report of it and send it to your email.

Duplicate Entries in AWS CloudTrail Logs
CloudTrail
Operational Excellence
Security

In order to prevent duplicate records in log occurrences for global AWS services such as IAM, STS or Cloudfront, ensure that only one trail in a multi-region logging setup has the 'Include Global Services' function enabled.

CloudTrail based API reports.
EC2
CloudTrail
Operational Excellence

Generate a report of all the API calls that are made in a particular interval. This report can be used to track user activities in our AWS account.

CloudTrail Logs Encrypted and Validated
Security
CloudTrail
Security

Sends a report of CloudTrail Trails which are not validated and encrypted.

Global Events with CloudTrail logging Disabled
CloudTrail
Security
Operational Excellence
CloudTrail

With API tracking for global services, such as IAM, STS and CloudFront, you can have complete visibility over all of your AWS infrastructure. Having CloudTrail logging enabled for regional and global AWS services will assist you to ensure compliance and troubleshoot operational or safety issues within your AWS account.

Enable global service events tracking in AWS CloudTrail
CloudTrail
Operational Excellence

With API tracking for global services, such as IAM, STS and CloudFront, you can have complete visibility over all of your AWS infrastructure. Having CloudTrail logging enabled for regional and global AWS services will assist you to ensure compliance and troubleshoot operational or safety issues within your AWS account.

IAM Policy Change Events
Operational Excellence
CloudTrail
IAM
CloudTrail

Send report of all IAM Policy changes in your AWS account. If any operations like create/delete IAM policy/User/role is performed in your AWS account then this workflow will generate a report of it and send it to your email.