Logging options for Amazon S3
You can record the actions that are taken by users, roles, or Amazon Web Services services on Amazon S3 resources and maintain log records for auditing and compliance purposes. To do this, you can use server-access logging, Amazon CloudTrail logging, or a combination of both. We recommend that you use CloudTrail for logging bucket-level and object-level actions for your Amazon S3 resources. For more information about each option, see the following sections:
The following table lists the key properties of CloudTrail logs and Amazon S3 server-access logs. To make sure that CloudTrail meets your security requirements, review the table and notes.
Log properties | Amazon CloudTrail | Amazon S3 server logs |
---|---|---|
Can be forwarded to other systems (Amazon CloudWatch Logs, Amazon CloudWatch Events) |
Yes |
No |
Deliver logs to more than one destination (for example, send the same logs to two different buckets) |
Yes |
No |
Turn on logs for a subset of objects (prefix) |
Yes |
No |
Cross-account log delivery (target and source bucket owned by different accounts) |
Yes |
No |
Integrity validation of log file by using digital signature or hashing |
Yes |
No |
Default or choice of encryption for log files |
Yes |
No |
Object operations (by using Amazon S3 APIs) |
Yes |
Yes |
Bucket operations (by using Amazon S3 APIs) |
Yes |
Yes |
Searchable UI for logs |
Yes |
No |
Fields for Object Lock parameters, Amazon S3 Select properties for log records |
Yes |
No |
Fields for |
No |
Yes |
Lifecycle transitions, expirations, restores |
No |
Yes |
Logging of keys in a batch delete operation |
No |
Yes |
Authentication failures1 |
No |
Yes |
Accounts where logs get delivered |
Bucket owner2, and requester |
Bucket owner only |
Performance and Cost | Amazon CloudTrail | Amazon S3 Server Logs |
Price |
Management events (first delivery) are free; data events incur a fee, in addition to storage of logs |
No other cost in addition to storage of logs |
Speed of log delivery |
Data events every 5 minutes; management events every 15 minutes |
Within a few hours |
Log format |
JSON |
Log file with space-separated, newline-delimited records |
Notes
-
CloudTrail does not deliver logs for requests that fail authentication (in which the provided credentials are not valid). However, it does include logs for requests in which authorization fails (
AccessDenied
) and requests that are made by anonymous users. -
The S3 bucket owner receives CloudTrail logs when the account does not have full access to the object in the request. For more information, see Amazon S3 object-level actions in cross-account scenarios.
-
S3 does not support delivery of CloudTrail logs or server access logs to the requester or the bucket owner for VPC endpoint requests when the VPC endpoint policy denies them or for requests that fail before the VPC policy is evaluated.