AWS CloudTrail Setup
This guide walks you through integrating AWS CloudTrail with RAD Security. This integration imports CloudTrail logs directly from your S3 bucket to provide comprehensive visibility into user activity, API usage, and potential security threats. The setup process involves:- Configuring AWS IAM permissions to allow RAD Security to access CloudTrail buckeet.
- Configuring the integration in RAD Security
Prerequisites
Before you begin, ensure you have:- AWS CloudTrail enabled and configured to log to an Amazon S3 bucket. Please check details in official AWS docs.
- Access to the AWS account to configure required IAM settings or apply Terraform
- Access to RAD Security app
Step 1. Enabling access to CloudTrail bucket
You can configure this integration using our official Terraform module (recommended) or manually.- Terraform (Recommended)
- Manual Setup
We recommend using our official Terraform module to automatically provision the necessary configuration.
Usage
You can use the guide in the RAD Security app by navigating to Data sources -> Add new -> Cloud provider.The following confguration needs to be included in the module to allow access to the S3 bucket.For full variable documentation and examples, visit the RAD Security Terraform Repository.
Step 2: Confguring the integration in RAD Security app
Navigate to your Data sources -> Integrations -> AWS -> CloudTrail -> Add integration Provide the required options.| Parameter | Description | Example |
|---|---|---|
| Integration Name | Production account | |
| S3 Bucket Name | The name of the S3 bucket storing CloudTrail logs | prod-cloudtrail-logs |
| S3 Bucket AWS Account ID | The AWS Account ID of the S3 bucket storing CloudTrail logs | 1234567890 |
Verify and Create.