Skip to content

Audit asks for logs of who did what in the cloud

CloudTrail (AWS), Activity Log (Azure), and Audit Logs (GCP) are the standard. Note: data events cost extra and must be enabled explicitly. By default only management events are captured.

Try this first

  1. 1AWS: CloudTrail multi-region and multi-account, output to a separate log-archive account with S3 Object Lock for immutable storage.
  2. 2Enable CloudTrail data events on your critical S3 buckets and Lambda functions. Default trail covers API calls, not GetObject or Invoke.
  3. 3Azure: Activity Log to a Log Analytics workspace, retention 90+ days. For data action audit: Diagnostic Settings per resource.
  4. 4GCP: Audit Logs (Admin Activity free, Data Access paid). Enable Data Access for services in audit scope.
  5. 5Set retention explicitly: 7 years for financial audits, 1 year for general. Default is often 90 days, too short for compliance.

When to bring us in

For SOC2, ISO 27001, or an active enquiry, logs are just the start. A log architecture with immutability, alerts and query discipline goes further, help is common there.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.