Monitoring attested requests - Amazon Key Management Service
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Monitoring attested requests

You can use your Amazon CloudTrail logs to monitor Decrypt, DeriveSharedSecret, GenerateDataKey, GenerateDataKeyPair, and GenerateRandom operations that use attestation. In these log entries, the additionalEventData field has a recipient field with information from the attestation document in the request. These fields are included only when the Recipient parameter in the request specifies a signed attestation document.

The specific information included in the CloudTrail log depends on the attestation method used.