Company
Date Published
Author
Danny Freese
Word count
1174
Language
English
Hacker News points
None

Summary

Organizations face significant challenges in meeting audit and compliance requirements, particularly in securing sensitive data and monitoring unauthorized activities. AWS CloudTrail Lake now supports recording user activity from various sources into a single, immutable storage for audit logs, enhancing the capability to respond to security incidents and audit requests. The recent integration of Kong Enterprise with AWS CloudTrail Lake allows Kong's audit logs to be stored and queried alongside AWS and non-AWS events, facilitating comprehensive compliance support. This integration involves creating a channel for Kong to deliver events to the AWS event store, deploying infrastructure components such as a Lambda function and ElastiCache-Redis, and configuring the Kong Admin API to handle audit logs. The infrastructure is validated through AWS CloudWatch, and Kong's audit logs are mapped to CloudTrail event data, ensuring no information is lost. This integration aims to simplify compliance efforts by centralizing Kong Gateway Audit logs within AWS infrastructure, enhancing security and monitoring capabilities.