Share the Post:

Building a Cost-Efficient, Centralised Logging Architecture Across 270 AWS Accounts for an EU Enterprise

As organisations in Europe increasingly scale their cloud usage, one challenge consistently emerges: how to monitor and audit activity across hundreds of AWS accounts in a cost-efficient, real-time, compliant way.
For enterprises under strict EU regulatory regimes — GDPR, financial-sector auditability, internal risk controls — the need for unified logging and monitoring is critical.

Recently, we supported a large EU enterprise facing exactly this problem. With 270 AWS accounts spread across multiple business units, they needed a centralised, scalable, and low-cost solution to collect logs, detect suspicious actions, and maintain compliance — without introducing operational overhead or expensive infrastructure.

Inspired by the AWS architecture described in “Enhancing Multi-Account Activity Monitoring with Event-Driven Architectures” on the AWS Blog, we designed a serverless, event-driven logging pipeline that solved all of these challenges.

The Customer’s Challenge

The organisation’s security and compliance team required:

  • Complete visibility of all API activity across 270 AWS accounts
  • Real-time alerting for IAM changes, privilege escalations, and sensitive configuration updates
  • A single, centralised audit trail for GDPR, internal audits, and regulatory reporting
  • A cost-efficient model — avoiding the high expense of polling API activity or running heavy SIEM ingestion

The existing approach — periodic polling and manual auditing — was slow, expensive, and missed activity happening between polling windows. As the number of accounts grew, this method was no longer viable.

Our Solution: Event-Driven Multi-Account Monitoring

We implemented a centralised logging and monitoring solution across all 270 AWS accounts using CloudTrail, AWS Organizations, and EventBridge — using a push-based architecture rather than resource-intensive polling.

1. Distributed Activity Capture (Per Account)

In each AWS account:

  • AWS CloudTrail collects all API actions across 250+ AWS services
  • EventBridge filters and routes relevant events
  • Only required activity (IAM changes, API calls, security-sensitive events) is delivered to a central audit account

This ensures minimum noise and maximum cost efficiency.

2. Event-Driven Transport (Push Model)

Instead of running scheduled scanners or pulling logs via API, each account pushes events automatically to central accounts.
This event-driven pattern provides:

  • Milliseconds-to-seconds latency
  • Guaranteed delivery
  • Zero infrastructure to manage
  • Significantly lower cost than polling services

3. Centralised Aggregation & Processing

In the central audit/compliance account, we built a unified pipeline where:

  • EventBridge receives cross-account logs
  • SQS buffers traffic and prevents throttling
  • Lambda & Kinesis perform real-time processing
  • All data is delivered into a secure S3 Data Lake
  • Optional: enrichment into OpenSearch or external SIEMs

By classifying events early, high-risk actions (e.g., IAM privilege updates) are processed in real time, while lower-priority events are batched for cost savings.

Results for the Customer

✔ Full Compliance & Audit Readiness

The organisation now has complete, centralised visibility of all API activity — supporting GDPR audit trails, internal investigations, and compliance reporting.

✔ Real-Time Risk Detection

IAM modifications, privilege escalations, unusual logins, and resource configuration changes trigger instant notifications.

✔ Highly Cost-Efficient

Because the solution is fully serverless and event-filtered:

  • No EC2 or polling systems to run
  • No over-provisioned infrastructure
  • EventBridge charges only for events actually sent
  • CloudTrail consolidation reduces duplicate logging costs

The customer saw >45% cost reduction compared to their prior SIEM-based ingestion model.

✔ Scales Automatically to New Accounts

When new AWS accounts are created, they are automatically onboarded through AWS Organizations — no manual configuration required.

✔ Minimal Operational Burden

The central team no longer maintains scripts, schedulers, or account-specific monitoring setups. Everything is automated.

Example: How This Helped the Customer

Within weeks of implementation:

  • All 270 accounts were sending filtered events into the central logging pipeline
  • The compliance team could run unified audit reports within minutes
  • Critical IAM activities were being flagged instantly
  • The customer eliminated thousands of euros in previously wasted monthly costs
  • Quarterly audit cycles were reduced from “weeks of manual work” to “a few hours”

This event-driven approach became a strategic enabler — giving the organisation the visibility it needed without the traditional cost and complexity of multi-account logging.

Conclusion

Centralising logging and monitoring across hundreds of AWS accounts doesn’t have to be expensive or complicated.
By leveraging AWS-native, serverless, event-driven services, enterprises can achieve:

  • Real-time visibility
  • Strong compliance posture
  • Significant cost savings
  • Automated scalability
  • Reduced operational overhead

For EU organisations operating at scale, this model provides a modern, compliant, and cost-optimised foundation for cloud governance.

If your organisation faces similar challenges, our team can help you design and deploy a solution tailored to your compliance requirements, operational structure, and budget.

Related Posts