Cloudanix Joins AWS ISV Accelerate Program

Cloudanix – Your Partner in Cloud Security Excellence

AWS Events and Changes You Should Track For Your AWS Account Security and Operational Excellence

  • Sujay Maheshwari Sujay Maheshwari
  • Monday, Jun 08, 2020

AWS Events and Changes To Track For Your AWS Account Security

AWS CloudTrail service captures and publishes every action taken or change performed across any other AWS services.

These changes could come as a result of

  • Console use by a user
  • An application running its code
  • A SaaS partner using assume role running/ accessing some API in your account
  • An event trigger another component (e.g File got uploaded on S3 which trigger a Lambda function)

As you can see everything gets pushed into CloudTrail.

The example below shows that the IAM user Alice used the AWS CLI to call the CreateUser action to create a new user named Bob.

{"Records": [{ "eventVersion": "1.0", "userIdentity": { "type": "IAMUser", "principalId": "EX_PRINCIPAL_ID", "arn": "arn:aws:iam::123456789012:user/Alice", "accountId": "123456789012", "accessKeyId": "EXAMPLE_KEY_ID", "userName": "Alice" }, "eventTime": "2014-03-24T21:11:59Z", "eventSource": "iam.amazonaws.com", "eventName": "CreateUser", "awsRegion": "us-east-2", "sourceIPAddress": "127.0.0.1", "userAgent": "aws-cli/1.3.2 Python/2.7.5 Windows/7", "requestParameters": {"userName": "Bob"}, "responseElements": {"user": { "createDate": "Mar 24, 2014 9:11:59 PM", "userName": "Bob", "arn": "arn:aws:iam::123456789012:user/Bob", "path": "/", "userId": "EXAMPLEUSERID" }} }]}

So much data?

Data -> information -> insights becomes challenging and overwhelming if the amount is large and needs to be consumed in real-time. So, below is the list of metrics that we recommend you keep an eye on. This doesn’t mean that other events are not important but the objective of this blog is to ensure that the signal-to-noise ratio for your team is minimum and you do not lose sight of critical updates.

  • ConsoleLogin

    •   * **What?** : This event is raised when anyone logs into the account using the AWS console.
      • Why? : Generally, if you have CI/ CD setup and your team uses command-line tools to interact with cloud API, then console login is a rare act. It makes it important to stay alert if there is a console login.
      • Risk : Medium
      • What to do next? If you have a console login, especially for someone with a root or administrator role, then checking with them offline (over Slack or other messenger-based tools) is recommended.
  • StopLogging

    •   * **What?** When AuditTrail logs are disabled. Yes, it raises this event and logs this action too 🙂
      • Why? There will be little to no reason that anyone without a planned notice and communication has disabled AuditTrail logs themselves. So, this event itself is a good enough reason to jump on it.
      • Risk : High
      • What to do next? Jump on a call with team members (if required), login into your console, and assess who did it? If it was a mistake, then reenable the logging again. Also, put controls and education in a place where this mistake doesn’t happen again in the future.
  • CreateRoute, CreateNetworkAclEntry, CreateSecurityGroup

    •   * **What?** These deal with [VPC](https://aws.amazon.com/vpc/getting-started/?ref=cloudanix.com) security – one of the building blocks in which your compute and other resources and data resides.
      • Why? This activity should be planned, documented, and approved activity.
      • Risk: High
      • What to do next? Alert your team about this and fix the issue/ process which has caused this.
  • AuthorizeDBSecurityGroupIngress, CreateDBSecurityGroup, DeleteDBSecurityGroup, RevokeDBSecurityGroupIngress

    •   * **Why?** Your database should be one of the most protected resources. Not only shouldn’t have a public assigned IP but it also should be in the Private subnet. Now listening for these events ensures that any changes with DB Security groups don’t go unnoticed.
      • Risk: High

References

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Tuesday, Feb 10, 2026

The 2026 CNAPP Compliance Framework: Turning Audit from Crisis to Continuity

Introduction: The Death of the Point-in-Time Audit In the high-velocity cloud landscape of 2026, the traditional app

Read More

Thursday, Feb 05, 2026

CSPM vs. CNAPP: Navigating Cloud Security Evolution for Modern Enterprises

The shift to cloud-native architectures represents a fundamental change in how applications are designed, built, and dep

Read More

Thursday, Jan 22, 2026

Top 10 Identity and Access Management Solutions

Identity and Access Management (IAM) has traditionally been considered one of the boring parts of security. But with the

Read More
Comprehensive cloud security platform covering code to cloud protection

Security for your Code, Cloud and Data

Cloudanix replaces your 5-6 disjointed security tools within 30 minutes.

Get Started