Our customers leverage AWS CloudTrail to record account activity across their AWS infrastructure. And with AWS CloudTrail Lake, a managed data lake, organizations can control aggregate, immutably store, and query events recorded by AWS CloudTrail.
Today, AWS and LaunchDarkly are taking this story a step further by allowing customers to ingest their LaunchDarkly activity data into CloudTrail Lake. Storing this data in CloudTrail Lake means customers can achieve a similar auditing experience for LaunchDarkly activity that they enjoy for AWS’ event activity. Development teams can analyze change events from LaunchDarkly alongside changes from other vendors and AWS. This means it’s easier to stay compliant with fewer tools, overhead, and steps.
Our integration with AWS CloudTrail Lake is easy to configure and brings you immediate, deep visibility into your LaunchDarkly account. Whether you’re just learning about what has changed, auditing changes for compliance standards such as PCI DSS or FedRAMP, or diagnosing the root cause of an incident for a report, this data is critical to teams operating production workloads.
The audit data we’re providing through this integration today gives you a broad view of changes in your account, including:
- Account member
- Account team
- Personal access token
- Service access token
- Project
- Environments
- Feature flags
- Segments
We’re excited for you to configure this integration today. Since you don’t need to create your own data pipeline to retrieve, store, and query for this data, you’ll save time and effort. Managing your LaunchDarkly audit data in AWS CloudTrail Lake is seamless and unified, allowing you to learn and maintain fewer tools and leverage a single source of truth.
To get started, check out our documentation.