AWS CloudTrail

AWS CloudTrail is cloud audit log data that describes activity across your AWS accounts. This is one of the most valuable data sources for running detections in AWS. This guide walks through how to set up AWS CloudTrail as a log source in Scanner Collect, so that logs can be ingested from S3, normalized, and indexed for search and detection.

Step 1: Create a New Source

Navigate to the Collect tab in the Scanner UI.

  • Click Create New Source.

  • Click Select a Source Type.

  • In the AWS category, select AWS: CloudTrail.

You’ll see that:

  • Ingest Method is set to AWS S3

  • Destination is set to Scanner

Click Next.

Step 2: Configure the Source

  • Set a Display Name, such as my-org-cloudtrail.

  • Leave File Type as CloudTrailJson.

  • Leave Compression as Gzip.

Click Next.

Step 3: Set the Origin (S3 Bucket)

  • Select the S3 bucket where your CloudTrail logs are stored.

  • (Optional) Enter a Bucket Prefix if logs are stored under a specific key path (e.g., AWSLogs/your-account-id/CloudTrail/).

  • Keep the File Regex as the default, which helps Scanner filter out non-CloudTrail objects.

Click Next.

Step 4: Set the Destination

  • Choose the Scanner index where CloudTrail logs should be stored for search and detection.

  • Leave the Source Label set to aws:cloudtrail.

Click Next.

Step 5: Transform and Enrich

  • Keep the default enrichment settings:

    • Normalize to ECS - AWS CloudTrail

    • Parse JSON Columns (automatically parses stringified JSON if present)

  • (Optional) Add additional transformation or enrichment steps if desired.

Click Next.

Step 6: Timestamp Extraction

Leave the default Timestamp Field as eventTime.

Click Next.

Step 7: Review and Create

  • Review your configuration.

  • (Optional) Use the preview feature to confirm how Scanner will match S3 keys and parse your log files.

When everything looks correct, click Create Source.

Once created, Scanner will begin monitoring your S3 bucket for new CloudTrail logs, index them into your selected destination, and make them available for search and detection.

Last updated

Was this helpful?