AWS Cloudtrail Dashboard

Description

This AWS Cloudtrail Monitoring dashboard brings together all relevant information regarding AWS Cloudtrail. You can see what happens in your Cloud environment on a single dashboard. This helps to understand the AWS Cloudtrail information very easily.

This Kibana dashboard is based on the Elastic Agent integration that is delivered OOTB. The agent integration also includes an out of the box AWS Cloudtrail dashboard. However the dashboard that you can download here is more comprehensive to delivers immediate insights.

What is AWS Cloudtrail?

AWS CloudTrail enables auditing, security monitoring, and operational troubleshooting. CloudTrail records user activity and API calls across AWS services as events. CloudTrail events help you answer the questions of “who did what, where, and when?”

CloudTrail logs can be collected inter regional and from multiple accounts. This makes the adoption very easy. If you want to start without configuring much you can also use this terraform example to monitor all AWS logs and metrics.

With AWS Cloudtrail you can monitor, store, and validate activity events for authenticity. Easily generate audit reports required by internal policies and external regulations.

You also be able to detect unauthorized access using the Who, What, and When information . Respond with the power of Elastic Security to prevent any kind of security issues.

In Elastic you can continuously monitor API usage history using machine learning (ML) models to spot unusual activity in your AWS accounts, and determine root cause.

Tested versions 8.x
ECS compliant Yes

You must log in to submit a review.

Related downloads

Filebeat Suricata Canvas dashboard

A Kibana Canvas dashboard example that visualizes suricata logs collected with Filebeat.

Sigma Zeek Detection rules

A collection of rules based on the Sigma rules for Zeek based on the Filebeat Zeek module.

Sigma Sysmon detection rules

A collection of rules based on the Sigma detection rules for Windows Sysmon events based on Winlogbeat data.

Sigma AWS Cloudtrail Detection rules

A collection of rules based on the Sigma rules for AWS based on the Filebeat AWS module and Elastic agent integration.

Cloudflare Kibana dashboards

Cloudflare dashboards and ingest pipelines to visualize cloudflare logs

AWS Cloudtrail Monitoring dashboard

Deep insights into AWS Cloudtrail events for SIEM and Monitoring

These downloads could be also interesting for you

Sigma Elastic SIEM rules for web server logs

A collection of rules based on the Sigma detection rules for web server looks, e.g. apache, nginx or IIS.

Timetable canvas

This canvas examples shows timetable data from trains. Its build based on the real world information panel in german trian stations. Its refreshing based on current time.

Elastic Cloud Monitoring dashboard

Kibana dashboard that uses the Elastic Cloud monitoring data to provide better insights into what’s happening in your cloud environment.

APM Services overview canvas

Average rating:

An adaptive turn key canvas example based on Elastic APM data.

Watch for changes in IOWaits

A watch which alerts if the time spent by a hosts CPU in IOWait, has increased by more than than N% in the last Y mins.

Sigma Windows Process Creation detection rules

A collection of rules based on the Sigma rules for Windows (process creation folder) based on Winlogbeat data .