Nmap CloudTrail Query Runbooks give you the power to act on that moment. They turn scattered data into actionable insight, combining the port-scanning efficiency of Nmap with the forensic visibility of AWS CloudTrail. This workflow detects unusual network behavior, links it to specific API calls, and lets you respond before a breach takes root.
Nmap excels at finding open ports and active services across your infrastructure. CloudTrail records AWS account activity in granular detail—every API call, every user action, every resource change. A runbook that connects these two tools can unmask patterns hidden in raw logs. You can flag unexpected internet-facing ports, trace them to configuration changes, and pinpoint the IAM principals behind them.
A well-built Nmap CloudTrail Query Runbook runs on a repeatable schedule or in direct response to an alert. It queries CloudTrail for events tied to any host Nmap identified as suspicious. For example, if Nmap shows a new port open on an EC2 instance, the runbook can pull all CloudTrail entries for that instance over the past hour, revealing whether the port was opened deliberately or as part of malicious activity.