# AWS Logs

## Overview

Panther supports log ingestion from the following Amazon Web Services (AWS) services:

[alb](https://docs.panther.com/data-onboarding/supported-logs/aws/alb "mention")

[rds](https://docs.panther.com/data-onboarding/supported-logs/aws/rds "mention")

[bedrock-model-invocation](https://docs.panther.com/data-onboarding/supported-logs/aws/bedrock-model-invocation "mention")

[cloudtrail](https://docs.panther.com/data-onboarding/supported-logs/aws/cloudtrail "mention")

[cloudwatch](https://docs.panther.com/data-onboarding/supported-logs/aws/cloudwatch "mention")

[config](https://docs.panther.com/data-onboarding/supported-logs/aws/config "mention")

[eks](https://docs.panther.com/data-onboarding/supported-logs/aws/eks "mention")

[guardduty](https://docs.panther.com/data-onboarding/supported-logs/aws/guardduty "mention")

[nlb](https://docs.panther.com/data-onboarding/supported-logs/aws/nlb "mention")

[security-hub](https://docs.panther.com/data-onboarding/supported-logs/aws/security-hub "mention")

[security-lake](https://docs.panther.com/data-onboarding/supported-logs/aws/security-lake "mention")

[s3](https://docs.panther.com/data-onboarding/supported-logs/aws/s3 "mention")

[transit-gateway](https://docs.panther.com/data-onboarding/supported-logs/aws/transit-gateway "mention")

[vpc](https://docs.panther.com/data-onboarding/supported-logs/aws/vpc "mention")

[waf](https://docs.panther.com/data-onboarding/supported-logs/aws/waf "mention")

Beyond these natively supported AWS log sources, Panther also supports log ingestion from any other services via our AWS data transports: [s3](https://docs.panther.com/data-onboarding/data-transports/aws/s3 "mention"), [sqs](https://docs.panther.com/data-onboarding/data-transports/aws/sqs "mention"), and [cloudwatch](https://docs.panther.com/data-onboarding/data-transports/aws/cloudwatch "mention").

In addition to log monitoring, we recommend using Panther's [Cloud Security Scanning](#cloud-security-scanning-for-aws-resources) to detect misconfigurations in your AWS environment.

## Panther-built detections

See Panther's prewritten AWS rules in [the panther-analysis Github repository](https://github.com/panther-labs/panther-analysis/tree/master/rules).

## Querying logs in Data Explorer

See example SQL queries, for use in Panther's [Data Explorer](https://docs.panther.com/search/data-explorer), on the following pages:

* [CloudTrail logs queries](https://docs.panther.com/search/data-explorer/example-queries/cloudtrail-logs-queries)
* [GuardDuty logs queries](https://docs.panther.com/search/data-explorer/example-queries/guardduty-logs-queries)
* [S3 Access logs queries](https://docs.panther.com/search/data-explorer/example-queries/s3-access-logs-queries)
* [VPC Flow logs queries](https://docs.panther.com/search/data-explorer/example-queries/vpc-flow-logs-queries)

## Cloud Security Scanning for AWS resources

Beyond monitoring your AWS logs, we recommend onboarding your AWS environment as a Cloud Account for [Cloud Security Scanning](https://docs.panther.com/cloud-scanning). Cloud Security Scanning checks your cloud resources against [policies](https://docs.panther.com/detections/policies) you've defined to identify and alert you to vulnerabilities in your AWS environment. Panther also comes with several [built-in policies](https://docs.panther.com/data-onboarding/supported-logs/broken-reference) based on common cloud infrastructure misconfigurations.

To learn more about how to set up Cloud Security Scanning for AWS, see [Onboarding the Cloud Account in Panther](https://docs.panther.com/cloud-scanning#onboarding-the-cloud-account-in-panther).


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.panther.com/data-onboarding/supported-logs/aws.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
