Enabling CloudTrail Reports

Enabling CloudTrail Reports

CloudCheckr now supports AWS CloudTrail. However, if the Access Key and Secret Key used when configuring your project does not provide permissions to access CloudTrail you will need to update that user’s permissions within AWS IAM.

Follow these steps to do so:

Step 1: Log in to your Amazon Web Services Management Console.

Step 2: Load the Identity and Access Management (IAM) Dashboard.

Step 3: On the right-hand IAM menu, click Groups.

Capture

Step 4: Select the group that contains the user whose Access and Secret Keys were added to CloudCheckr.

Capture

Step 5: Click the Permissions tab.

Capture

Step 6: Click the Attach Another Policy button

Capture

Step 7: Select AWS CloudTrail Read Only Access from the list.

Capture

Step 8: Click Apply Policy

Capture

That’s it! CloudCheckr will now be able to report using your CloudTrail data.