This talk will dive headfirst into the logging capabilities that are built into AWS, when to generate your own logs, how to make the best use of them.'the talk will also discuss architectural 'decisions that will improve Threat Hunting and make use of the power of an automated cloud environment.