AWS

How to Detect Suspicious Activity in Your AWS Account by Using Private Decoy Resources

Amazon’s cloud platform provides resources using its multiple services on-demand all around the globe, and the platform charges for each resource used. The detection of suspicious activities is an alarming event that can lie in the security breach domain but before acting on it, the user needs to be sure that he isn’t using those resources. It can be done using the CloudTrail service of the AWS platform using its dashboard.

Detect Suspicious Activity in Your AWS Account by Using Private Decoy Resources

Start with a search for the “CloudTrail” service from the AWS dashboard:

Click on the “Create a trail” button from the CloudTrail dashboard:

Click on the “Create trail” button after typing the name of the trail:

Once the CloudTrail is created, simply head into the S3 bucket attached to the trail by clicking on its link:

In the S3 bucket, the log file has been created which will create files for each activity and then click on the “Upload” button:

Click on the “Add files” button or Drag and drop the file to upload in the S3 bucket:

The file is added to the “Files and folders” section:

After that, simply scroll down the page to click on the “Upload” button:

Once the file is uploaded to the S3 bucket, simply head into the AWSLogs link to detect activities:

Simply click on the account ID link from the page:

Head into the “CloudTrail” by clicking on its link:

Head into the region by clicking on its link:

Click on the year to head into it:

Then, comes the month in which the activity occurred, simply head into it:

After that, click on the date:

Here the platform placed the “JSON,” which contains the trail of the activities:

You have successfully created a trail on the CloudTrail dashboard.

Conclusion

To detect suspicious activities in your AWS account, simply head into the CloudTrail service and create a trail that will create files for each activity with its data and region. All the files are placed inside the S3 bucket created at the time of trial creation, and the files can be downloaded from the S3 bucket. If the user is suspected of any suspicious activity, simply head into the S3 bucket and download the JSON file.

About the author

Talha Mahmood

As a technical author, I am eager to learn about writing and technology. I have a degree in computer science which gives me a deep understanding of technical concepts and the ability to communicate them to a variety of audiences effectively.