Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

2.2.2. Configuring Logging for AWS Services

First Principle: Default logging configurations are insufficient for security operations. Most AWS services require explicit configuration to capture security-relevant events, and organizational deployment ensures no account or Region is missed.

CloudTrail Configuration (Critical):
  • Organization trail: Create one trail in the management account that automatically captures API events from ALL accounts in the organization
  • Management events: Logged by default — capture control plane operations (CreateBucket, RunInstances)
  • Data events: NOT logged by default — capture data plane operations (GetObject, InvokeFunction). Must be explicitly enabled per-service.
  • Insights events: ML-based detection of unusual API activity patterns
CloudWatch Agent Configuration:
  • Install the unified CloudWatch agent on EC2 instances to collect OS-level logs and custom application logs
  • Use SSM Agent for push-based deployment across fleets
  • Configure log groups with appropriate retention periods and encryption (KMS)
  • A dedicated logging account is a best practice — receives logs from all accounts, restricts access to the security team
Service-Specific Logging:
ServiceHow to EnableKey Consideration
S3Server access logging or CloudTrail data eventsData events provide richer detail
LambdaCloudWatch Logs (automatic if role has permissions)Execution role needs logs:CreateLogGroup, logs:PutLogEvents
API GatewayCloudWatch Logs (enable in stage settings)Enable both execution logs and access logs
RDSEnable audit logs, slow query logsExport to CloudWatch Logs for real-time analysis

⚠️ Exam Trap: CloudTrail data events have per-event costs. Don't enable them for every S3 bucket — target buckets containing sensitive data. The exam may test cost-optimization for logging architectures.

Scenario: A security architect needs to ensure all API activity across 200 accounts is captured, including S3 object-level operations on buckets containing PII. They configure an organization trail with management events enabled globally and data events enabled only for PII-classified buckets.

Reflection Question: Why does the exam distinguish between management events and data events, and what are the cost implications of enabling data events broadly?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications