Overview
The AWS CloudTrail integration automatically discovers AI model usage in your AWS environment by monitoring CloudTrail events for Amazon Bedrock API calls. This gives your security team visibility into which AI models are being used, by whom, and how frequently.What Data Is Collected
Ayliea reads API call metadata only from CloudTrail:- Model IDs — which Bedrock models are invoked (e.g.,
anthropic.claude-3-sonnet) - User identities — IAM users or roles making the calls
- Timestamps — when calls occurred
- Event names — the API action (e.g.,
InvokeModel) - Region — which AWS region the call was made in
Prerequisites
- An AWS account with Amazon Bedrock enabled
- Permission to create IAM users and policies
- An Ayliea organization on the Business plan or higher
Setup Steps
1. Create an IAM Policy
In the AWS Console, navigate to IAM > Policies > Create Policy and paste this JSON:AylieaCloudTrailReadOnly.
This policy grants read-only access to CloudTrail events. It cannot modify any AWS resources.
2. Create an IAM User
- Go to IAM > Users > Create User
- Name the user (e.g.,
ayliea-cloudtrail-reader) - Do not enable console access
- Attach the
AylieaCloudTrailReadOnlypolicy you created
3. Generate Access Keys
- Open the new user’s detail page
- Go to Security credentials > Access keys > Create access key
- Select Third-party service as the use case
- Copy the Access Key ID and Secret Access Key
4. Connect in Ayliea
- Go to Organization > Cloud Integrations
- Click Connect on the AWS CloudTrail card
- Enter your Access Key ID, Secret Access Key, and Region
- Click Test Connection to validate
- Click Connect to save
Polling Schedule
Once connected, Ayliea polls CloudTrail daily at 7:00 AM UTC. Each poll covers the time since the last successful poll. The first poll covers the previous 24 hours.Troubleshooting
”Invalid credentials or insufficient permissions”
- Verify the Access Key ID and Secret Access Key are correct
- Confirm the IAM user has the
AylieaCloudTrailReadOnlypolicy attached - Check that CloudTrail is enabled in the specified region
”Failed to connect to AWS CloudTrail”
- Verify the region is correct (e.g.,
us-east-1, notUS East) - Check that your AWS account doesn’t have restrictive SCPs blocking CloudTrail access
No platforms discovered after connecting
- Confirm that Amazon Bedrock is being used in the specified region
- CloudTrail events may take up to 15 minutes to appear
- The first poll covers only the last 24 hours — wait for the next daily poll
Security Considerations
- Credentials are encrypted with AES-256-GCM before storage
- The IAM policy grants read-only access to CloudTrail events only
- Ayliea never accesses S3 buckets, Lambda functions, or any other AWS services
- You can revoke access at any time by deleting the IAM user or disconnecting in Ayliea

