Skip to main content

Audit Logging Policies

Manage audit logging for your CoreWeave buckets

Audit logging policies

Audit logs allow organizations to see granular details about all actions performed on their CoreWeave resources. Audit logging policies govern how an organization collects, stores, and analyzes that data.

Info

CoreWeave audit logs contain only audits for resources stored directly with CoreWeave.

Enabling and controlling audit logs

CoreWeave creates an audit logging bucket by default for each customer, named cw-<Org ID>-audit-logs, where <Org ID> is replaced by your organization ID. For example, if your organization ID is 12345a, your audit logging bucket would be called cw-12345a-audit-logs.

Audit access permissions

Required access permissions s3:PutObject and s3:ListBucket must be configured manually for this bucket. CoreWeave users with admin permissions can use curl commands to grant CoreWeave access via the /bucket/settings and /organization/settings API endpoints.

Below is an example bucket policy allowing CoreWeave to write data to a customer's buckets:

Example
{
"Statement": [
{
"Action": [
"s3:ListBucket",
"s3:PutObject"
],
"Effect": "Allow",
"Principal": {
"CW": [
"arn:aws:iam::coreweave:static/audit-logs"
]
},
"Resource": [
"arn:aws:s3:::cw-<Org ID>-audit-logs",
"arn:aws:s3:::cw-<Org ID>-audit-logs/*"
]
}
],
"Version": "2012-10-17"
}
Learn more

For step-by-step instructions on how to enable audit logging for a bucket, please see the Object Storage API Reference and Bucket Policies reference pages.