Store AWS SSM Session Logs in S3 for Long-Term Retention

1 min read

Introduction
By default, AWS SSM Session Manager does not store logs permanently. While CloudWatch is great for real-time monitoring, S3 provides long-term log storage for security audits and compliance.
This guide covers:
✅ Creating an S3 bucket for SSM logs
✅ Enabling SSM session logging to S3
✅ Verifying logs are saved in S3
Step 1: Create an S3 Bucket for Logging
- Navigate to AWS S3 Console → Click Create bucket.
- Enter a unique bucket name (e.g.,
ssm-session-logs-123
). - Choose the AWS region where your EC2 instances run.
- Under Block Public Access settings, ensure public access is blocked.
- Click Create bucket.
Step 2: Attach IAM Permissions for S3 Logging
AWS SSM needs permission to write logs to the S3 bucket.
- Go to the AWS IAM Console → Click Roles.
- Select the IAM role attached to your EC2 instance (e.g.,
SSMLoggingRole
). - Click Attach Policies → Choose AmazonS3FullAccess.
- Click Save.
Step 3: Enable SSM Logging to S3
- Navigate to AWS Systems Manager Console → Click Session Manager.
- In the left panel, click Preferences.
- Click Edit and configure:
- ✅ Enable S3 Logging → Select your S3 bucket from Step 1.
- Click Save.
Step 4: Verify Logs in S3
- Start an SSM session:
aws ssm start-session --target <INSTANCE_ID>
0
Subscribe to my newsletter
Read articles from Joshua Welbeck directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
