Enabling CloudTrail Reports
CloudCheckr now supports AWS CloudTrail. However, if the Access Key and Secret Key used when configuring your project does not provide permissions to access CloudTrail you will need to update that user’s permissions within AWS IAM.
Follow these steps to do so:
Step 1: Log in to your Amazon Web Services Management Console.
Step 2: Load the Identity and Access Management (IAM) Dashboard.
Step 3: On the right-hand IAM menu, click Groups.
Step 4: Select the group that contains the user whose Access and Secret Keys were added to CloudCheckr.
Step 5: Click the Permissions tab.
Step 6: Click the Attach Another Policy button
Step 7: Select AWS CloudTrail Read Only Access from the list.
Step 8: Click Apply Policy
That’s it! CloudCheckr will now be able to report using your CloudTrail data.