CloudTrail Log File Integrity
To determine whether a log file was modified, deleted, or unchanged after CloudTrail delivered it, you can use CloudTrail log file integrity validation.
This feature is built using industry standard algorithms: SHA-256 for hashing and SHA-256 with RSA for digital signing.
This makes it computationally infeasible to modify, delete or forge CloudTrail log files without detection.
When you enable log file integrity validation, CloudTrail creates a hash for every log file that it delivers.
Every hour, CloudTrail also creates and delivers a file that references the log files for the last hour and contains a hash of each called a digest file.
The digest files are delivered to the same S3 bucket associated with your trail as your CloudTrail log files.
Enabling Log File Integrity Validation for CloudTrail
To enable log file integrity validation with the CloudTrail console, choose Yes for the Enable log file validation option when you create or update a trail. By default, this feature is enabled for new trails.
To validate logs with the AWS CLI, use the CloudTrail
validate-logs
command (this uses the digest files delivered to your Amazon S3 bucket to perform the validation).
Last updated
Was this helpful?