- Newest
- Most votes
- Most comments
Hi There
Both of your approaches will work, it may just come down to cost. With S3 replication, you are only going to pay for the S3 charges and you have the option of storing the logs in a lower tier storage class in the destination bucket so this may be the cheaper way. See Replication Pricing. With Cloudtrail, you are going to pay for the additional trail PLUS the S3 storage.
You can setup a replication rule the log Archive account on the CloudTrail Logs bucket to replicate the logs to a bucket in the member account. You can filter the replication rule to only replicate the member account prefix which is <org_id>/AWSLogs/<org_id>/<acct_id>/
You can follow the steps here to create a bucket in the member account that the source account will be able to replicate to.
You can also grant access to member accounts directly to the source bucket. See https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-sharing-logs.html
You could leverage Delegated Admin approach.
Please refer following documentation
https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html
Best Regards Kishor
Thank you Kishor, But let me drill down on the use case a little and see if this still fits: I would like to grant these member accounts access to the logs, but I want them ONLY to have access to their own account related logs. It looks like this would give them visibility to everything which is not desirable.
Relevant content
- asked a year ago
- Accepted Answerasked a year ago
- AWS OFFICIALUpdated a month ago
- AWS OFFICIALUpdated a year ago
Thank you Matt, I think these were the considerations I was looking for
No Problem!. Also be aware that the member account already has access to the last 90 days of events in their own account through the CloudTrail console without doing any of the above.