1

The Problem statement is like how can one person audit the amount of data out/downloaded from AWS s3 by an IAM user. On a explanatory note in my company from a long time billing is exceeding due to AWS S3 data download but I am unable to find out which IAM user of my company is downloading this huge amount of data.

John Rotenstein
  • 241,921
  • 22
  • 380
  • 470

2 Answers2

0

You can audit the actions of IAM users via CloudTrail. This is a good product to have if you need to audit the activity of IAM principles in the account.

user2977636
  • 2,086
  • 2
  • 17
  • 21
  • Are you sure that CloudTrail can report on volumes of traffic resulting from a `GetObject` request? I thought that it only records the API request itself? – John Rotenstein Feb 23 '21 at 05:01
0

You can audit all S3 actions by enabling log delivery and aggregate it to get desired summarized data.

On the Request log field, you can view the canonical user ID of the requester, or a - for unauthenticated requests. If the requester was an IAM user, this field returns the requester's IAM user name along with the AWS root account that the IAM user belongs to. This identifier is the same one used for access control purposes.

John Paulo Rodriguez
  • 1,280
  • 18
  • 21