Ensure your logs are kept for the correct retention period, have backup copies, and have a standard operating procedure (SOP) for incident response.
Go to CloudWatch Logs
/aws/lambda/AuditLoggerDemo
.S3 Object Lock
audit-demo-logs
bucket.Create Backup vault
AuditBackupVault
.
Create Backup plan
AuditBackupPlan
Assign resource to plan
AuditBackupPlan
→ Assign resources → Resource type = S3 → ARN = arn:aws:s3:::audit-demo-logs
→ Assign.
Proof of data (S3 Object Lock)
aws s3api list-object-versions
–bucket audit-demo-logs
–prefix logs/
Check if any version has been deleted or overwritten without authorization.
Rebuild QuickSight dashboard
QuickSight → Datasets → select AuditLogsAthena
→ click Refresh → wait for SPICE import → Visualize to update the dashboard with new data.
With these steps, we have set up retention, backup/recovery, and incident response procedures for the audit system, ensuring it is always safe, recoverable, and operates smoothly.