Someone in your AWS account just touched data they shouldn’t have. You need to know who, what, and when—fast.
The AWS CLI gives power users a way to run commands with different profiles. But when you’re dealing with multiple AWS CLI-style profiles, scattered roles, and complex account structures, tracking which profile accessed which resource and at what time becomes a critical challenge. This is not something you want to piece together after the fact.
Why AWS CLI-Style Profiles Make Tracking Hard
AWS CLI profiles simplify switching between accounts and roles. Developers and DevOps teams rely on them daily. The flip side is that each profile points to credentials—permanent or assumed—and AWS doesn’t automatically translate profile use into a clean, human-readable audit log. The CloudTrail logs are there, but finding the exact mapping from a CLI profile name to an IAM principal to specific events is tedious and slow.
This complexity multiplies when you have dozens of profiles across local machines, CI/CD systems, ephemeral environments, and remote developers. Without discipline, it’s impossible to pinpoint the “who” behind sensitive changes in a reasonable time.
The Right Way to See Who Accessed What and When
The goal is clear visibility—knowing which named profile was used for each call, the exact resources affected, and the exact timestamps. Setting up CloudTrail in every account is the start. But the real key is correlating CloudTrail events with the source CLI profile and doing it in a way that can be queried instantly.