AWS Cloudtrail - Connection Failed

If you're seeing a "missing permissions" error while trying to connect AWS CloudTrail—even when using CloudFormation and the SecurityAudit policy—this guide will help you identify and resolve the issue.

🔍 Why This Happens

There are two common reasons the CloudTrail connection might fail:

  1. No CloudTrail trails exist in the AWS account

  2. The required IAM permissions are missing from the connected role

Both are required for the platform to collect audit trail data successfully.

 

What You Need to Do

🧭 Step 1: Check if Trails Exist

  1. Open the AWS CloudTrail console

  2. Confirm whether any trails are listed

  3. If you're unsure, take a screenshot of the dashboard to review

If no trails are present, the connection will fail because there’s no data to pull.

Next steps:

  • If audit logging isn’t needed, you can ignore CloudTrail for this account

  • Otherwise, create a new trail in CloudTrail, then return to the platform and try reconnecting


🔐 Step 2: Check Role Permissions

If trails do exist, check the IAM permissions:

  1. Go to IAM > Roles in the AWS Console

  2. Select the Scytale_ReadOnly role

  3. Ensure the SecurityAudit managed policy is attached

This policy is essential for reading CloudTrail settings and events.
Without it, the connection can’t be completed—even if a trail is configured.