Benchmark: CloudTrail Log Detections
Description
This benchmark contains recommendations when scanning CloudTrail logs.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/tailpipe-mod-aws-cloudtrail-log-detections
Start the Powerpipe server:
powerpipe server
Open http://localhost:9033 in your browser and select CloudTrail Log Detections.
Run this benchmark in your terminal:
powerpipe benchmark run aws_cloudtrail_log_detections.benchmark.cloudtrail_log_detections
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run aws_cloudtrail_log_detections.benchmark.cloudtrail_log_detections --share
Benchmarks
- CloudFront Detections
- CloudTrail Detections
- CloudWatch Detections
- CodeBuild Detections
- Config Detections
- EBS Detections
- EC2 Detections
- EFS Detections
- EventBridge Detections
- GuardDuty Detections
- IAM Detections
- KMS Detections
- Lambda Detections
- RDS Detections
- Route 53 Detections
- S3 Detections
- SES Detections
- SNS Detections
- SQS Detections
- SSM Detections
- VPC Detections
- WAF Detections