Skip to main content

Create Trail

The Create Trail wizard guides you through configuring and deploying a new AWS CloudTrail trail across one or more AWS accounts. The wizard consists of four steps that walk you through all required and optional settings.

Accessing the Wizard

You can start the Create Trail wizard in two ways:

  • Click Create Trail in the sidebar navigation
  • Click the Create Trail button on the Trail List page

Wizard Steps

The wizard progresses through four steps in order:

StepNameDescription
1Trail SettingsConfigure the trail name, region, and multi-region setting
2Select AccountsChoose which AWS accounts to include in the trail
3S3 BucketConfigure the S3 bucket for storing trail logs
4EventsConfigure which event types to capture

You can navigate back to previous steps at any time by clicking on the step name in the wizard header. You must complete all required fields in each step before proceeding to the next.

Clone Mode

If you arrived at the Create Trail wizard by clicking Clone Trail on a Trail Detail page, the wizard operates in clone mode. In this mode, the following settings are pre-populated from the source trail:

  • Multi-region toggle
  • Trail region
  • Event configuration (all event types and their settings)

The following fields are not pre-populated and must be set fresh:

  • Trail name (must be unique)
  • Account selection
  • S3 bucket configuration
tip

Cloning is useful when you want to create a trail with the same event configuration but for different accounts or with a different S3 bucket destination.

Prerequisites

Before creating a trail, ensure:

  • At least one AWS account is onboarded in Prism
  • You have authenticated to the CloudTrail
  • You know which accounts should be included in the trail
  • You have decided on an S3 bucket strategy (new or existing)

Step 1: Trail Settings

In this step, you configure the trail's name, home region, and whether it should capture events from all AWS regions.

Trail Name

PropertyValue
TypeText input
RequiredYes
ConstraintsMust be unique within your organization

Enter a descriptive name for the trail. The trail name is permanent and cannot be changed after creation. Choose a name that clearly identifies the trail's purpose, such as production-audit-trail or security-monitoring.

tip

Use a consistent naming convention across your trails. For example, include the environment (prod, dev) or purpose (security, compliance) in the name.

Multi-Region Trail

PropertyValue
TypeToggle switch
RequiredNo
DefaultEnabled (recommended)

When enabled, the trail captures API events from all AWS regions, not just the home region. This is the recommended setting for comprehensive audit coverage.

  • Enabled -- Events are recorded from every AWS region, ensuring you capture activity regardless of where it occurs
  • Disabled -- Events are only recorded from the region specified in Trail Region
warning

Disabling multi-region means you will not capture API activity in other regions. If someone performs actions in a region not covered by your trail, those events will not be logged. Enable multi-region unless you have a specific reason to limit the trail to a single region.

Trail Region

PropertyValue
TypeDropdown select with search
RequiredYes
DefaultNone

Select the AWS region where the trail will be created. This is the trail's home region. If multi-region is disabled, only events from this region will be captured.

The following regions are available:

Region CodeRegion Name
us-east-1US East (N. Virginia)
us-east-2US East (Ohio)
us-west-1US West (N. California)
us-west-2US West (Oregon)
ap-south-1Asia Pacific (Mumbai)
ap-northeast-3Asia Pacific (Osaka)
ap-northeast-2Asia Pacific (Seoul)
ap-southeast-1Asia Pacific (Singapore)
ap-southeast-2Asia Pacific (Sydney)
ap-northeast-1Asia Pacific (Tokyo)
ca-central-1Canada (Central)
eu-central-1Europe (Frankfurt)
eu-west-1Europe (Ireland)
eu-west-2Europe (London)
eu-west-3Europe (Paris)
eu-north-1Europe (Stockholm)
sa-east-1South America (Sao Paulo)
tip

Choose a region that is close to your primary operations or that aligns with your compliance requirements. The trail region also determines where the S3 bucket is created if you choose to create a new bucket.


Step 2: Select Accounts

In this step, you choose which AWS accounts in your organization will have the CloudTrail trail deployed.

Account List

The step displays all AWS accounts that have been onboarded to your Prism organization. Each account is shown with its name and account ID.

Searching Accounts

Use the search bar at the top of the account list to filter accounts by account name or account ID. The list filters in real time as you type.

Selecting Accounts

You can select accounts in two ways:

  • Individual selection -- Click the checkbox next to each account you want to include
  • Select All / Deselect All -- Use the bulk action buttons to quickly select or clear all accounts

A counter at the top of the list shows "Selected: X of Y accounts", where X is the number of selected accounts and Y is the total number of available accounts.

info

At least one account must be selected before you can proceed to the next step. The Next button is disabled until you have selected at least one account.

Considerations

  • All selected accounts will have the trail deployed to them simultaneously
  • If you need to add more accounts later, you can do so from the Trail Detail page using the Add Accounts button
  • The account you choose for the S3 bucket (in the next step) must be among the selected accounts
  • Each account will have an independent deployment status that you can monitor after creation
tip

For comprehensive audit coverage, select all accounts in your organization. You can always remove individual accounts later from the Trail Detail page if needed.


Step 3: S3 Bucket Configuration

In this step, you configure where CloudTrail log files will be stored. You can either create a new S3 bucket or use an existing one.

Bucket Account

PropertyValue
TypeAutocomplete dropdown
RequiredYes
OptionsFiltered to accounts selected in Step 2

Select the AWS account where the S3 bucket resides (or will be created). The dropdown only shows accounts that you selected in the previous step.

warning

The bucket account is significant because:

  • This account cannot be removed from the trail as long as it hosts the trail's S3 bucket
  • If you create a new bucket, it will be created in this account
  • If you use an existing bucket, it must already exist in this account

Bucket Option

PropertyValue
TypeRadio button selection
RequiredYes
DefaultCreate new bucket

Choose how to provide the S3 bucket:

Create New Bucket (Default)

Prism will create a new S3 bucket in the selected bucket account. The bucket name is auto-generated using the format:

cloudtrail-{realm}-{timestamp}

Where {realm} is your organization's Prism realm identifier and {timestamp} is the current Unix timestamp. You can modify the auto-generated name if desired.

info

When you delete a trail that uses a newly created bucket, you will have the option to also delete the S3 bucket. This option is only available for buckets that Prism created.

Use Existing Bucket

Specify the name of an S3 bucket that already exists in the selected bucket account. The bucket must:

  • Already exist in the selected AWS account
  • Have the appropriate permissions for CloudTrail to write log files
  • Be accessible from the trail's home region

S3 Bucket Name

PropertyValue
TypeText input
RequiredYes
DefaultAuto-generated (for new buckets)

The name of the S3 bucket. For new buckets, an auto-generated name is pre-filled but can be modified. For existing buckets, enter the exact bucket name.

S3 bucket names must follow AWS naming rules:

  • 3 to 63 characters long
  • Only lowercase letters, numbers, hyphens, and periods
  • Must start and end with a letter or number

S3 Key Prefix

PropertyValue
TypeText input
RequiredNo
DefaultEmpty

An optional prefix that organizes CloudTrail log files within the S3 bucket. When set, logs are stored under this path prefix.

For example, if you set the prefix to audit-logs, your log files will be stored at:

s3://your-bucket-name/audit-logs/AWSLogs/{account-id}/CloudTrail/...
tip

Use an S3 key prefix if you plan to store logs from multiple trails in the same bucket, or if you want to organize logs alongside other data in the bucket.


Step 4: Event Configuration

In this step, you configure which types of AWS events the trail will capture. This step also displays a review panel summarizing your entire trail configuration before submission.

Event Types

CloudTrail supports four categories of events. Each can be independently configured:

Event TypeDescriptionDefault
Management EventsControl plane operations that manage AWS resourcesEnabled
Data EventsData plane operations on resourcesDisabled (no selectors)
Insight EventsAnomaly detection for unusual API activityDisabled
Network Activity EventsVPC endpoint network activityDisabled (no selectors)

Management Events

Management events capture control plane operations -- API calls that create, modify, or delete AWS resources (e.g., CreateBucket, RunInstances, DeleteTable).

FieldTypeDefaultDescription
Enable Management EventsToggleEnabledWhether to capture management events.
Read/Write TypeSelectAllWhich operations to log: All, ReadOnly, or WriteOnly.
Exclude AWS KMS eventsCheckboxUncheckedWhen checked, excludes AWS Key Management Service events (high-volume in many environments).
Exclude Amazon RDS Data API eventsCheckboxUncheckedWhen checked, excludes Amazon RDS Data API events.
tip

AWS KMS events can generate significant log volume because many AWS services call KMS frequently for encryption operations. Excluding KMS events can reduce log volume and costs without losing visibility into resource management activity.

For more details, see Management Events.

Data Events

Data events capture data plane operations performed on or within AWS resources, such as reading an S3 object or invoking a Lambda function.

Click Add Data Event Selector to add a new selector. You can add multiple selectors to capture different resource types. Each selector has the following fields:

FieldTypeRequiredDescription
Resource TypeDropdownYesThe AWS resource type to monitor.
Read/WriteSelectYesWhich operations to log: All, ReadOnly, or WriteOnly. Default: All.
Resource ARNsText inputNoComma-separated list of ARNs to filter specific resources. Leave empty to log all resources of the selected type.

Supported Resource Types

Resource Type
AWS::S3::Object
AWS::Lambda::Function
AWS::DynamoDB::Table

To remove a data event selector, click the remove button on the selector.

For more details, see Data Events.

Insight Events

Insight events enable CloudTrail to detect unusual API activity patterns and generate insight events when anomalies are detected.

FieldTypeDefaultDescription
API call rate insightCheckboxUncheckedDetects anomalies in the rate of API calls.
API error rate insightCheckboxUncheckedDetects anomalies in the rate of API error responses.
info

Insight events require management events to be enabled on the trail. CloudTrail analyzes management event patterns to detect anomalies.

For more details, see Insight Events.

Network Activity Events

Network activity events capture network-level activity through VPC endpoints, letting you monitor which AWS services are being accessed over your VPC endpoints.

Click Add Network Activity Selector to add a new selector. Each selector has the following field:

FieldTypeRequiredDescription
Event SourceAutocomplete with custom inputYesThe AWS service event source to monitor (e.g., ec2.amazonaws.com, s3.amazonaws.com).

The event source field provides autocomplete suggestions for supported AWS service endpoints. For the full list of available event sources, see Network Activity Events. You can also enter custom event source values.

To remove a network activity selector, click the remove button on the selector.

For more details, see Network Activity Events.

Review Panel

Before submitting, the review panel on Step 4 displays a summary of your complete trail configuration across all four wizard steps:

  • Trail Settings -- Trail name, region, multi-region setting
  • Selected Accounts -- Number and list of selected accounts
  • S3 Bucket -- Bucket name, bucket account, key prefix, and whether it is new or existing
  • Events -- Summary of all enabled event types and their settings

Review all settings carefully before clicking Create Trail.


What Happens After Submission

After you click Create Trail:

  1. You are returned to the Trail List page
  2. The new trail appears with a pending status
  3. The trail status transitions to in_progress as deployment begins
  4. Each selected account is provisioned with the trail configuration
  5. Once all accounts are deployed, the status changes to completed
  6. If any accounts fail, the status changes to partial_failure
info

The Trail List automatically polls every 5 seconds while operations are active, so you can watch the deployment progress in real time.