<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Bharath Nadar</title>
    <description>The latest articles on Forem by Bharath Nadar (@bharathnoddy).</description>
    <link>https://forem.com/bharathnoddy</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1386608%2F27097396-aacb-4bd6-84a0-7f9d515ae1ef.png</url>
      <title>Forem: Bharath Nadar</title>
      <link>https://forem.com/bharathnoddy</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/bharathnoddy"/>
    <language>en</language>
    <item>
      <title>A $200,000 AWS Bill Nobody Noticed — Fixed in 5 Minutes</title>
      <dc:creator>Bharath Nadar</dc:creator>
      <pubDate>Wed, 11 Mar 2026 14:47:30 +0000</pubDate>
      <link>https://forem.com/bharathnoddy/a-200000-aws-bill-nobody-noticed-fixed-in-5-minutes-3p08</link>
      <guid>https://forem.com/bharathnoddy/a-200000-aws-bill-nobody-noticed-fixed-in-5-minutes-3p08</guid>
      <description>&lt;p&gt;We had a $200,000 problem hiding in plain sight.&lt;/p&gt;

&lt;p&gt;Not a breach. Not a runaway workload. A single config field set years ago that nobody had revisited as the company scaled.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Numbers That Didn't Add Up
&lt;/h2&gt;

&lt;p&gt;Late 2025. Reviewing AWS Cost Explorer. CloudTrail — a line item that used to sit quietly around $1,000 a month — had crept to $10,000 in one prod account and $30,000 at the org level.&lt;/p&gt;

&lt;p&gt;It never triggered an alert because it didn't spike. It crept.&lt;/p&gt;

&lt;p&gt;Around the same time, other costs had come down — reserved instance discounts, some workloads rightsized. The overall bill looked reasonable. CloudTrail was hiding in the noise.&lt;/p&gt;

&lt;p&gt;By the time I caught it: roughly $200,000 spent on audit logs nobody had asked for.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Was Causing It
&lt;/h2&gt;

&lt;p&gt;Breaking down CloudTrail by usage type in Cost Explorer showed the bill was driven entirely by data event recording — &lt;strong&gt;8.98 billion S3 events in us-east-1 alone&lt;/strong&gt; in December, at &lt;strong&gt;$0.10 per 100,000 events&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The org trail config explained why:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"ReadWriteType"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"All"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"DataResources"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nl"&gt;"Type"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"AWS::S3::Object"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nl"&gt;"Values"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"arn:aws:s3:::"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Every S3 API call. Every read, every write. Every bucket. Every account in the org.&lt;/p&gt;

&lt;p&gt;S3 reads account for &lt;strong&gt;85–95% of all S3 data events&lt;/strong&gt; in a production environment. ML pipelines, CDN origins, build artifact stores — all logging every single fetch. Billions of them. Every month.&lt;/p&gt;

&lt;h2&gt;
  
  
  Does Compliance Actually Require This?
&lt;/h2&gt;

&lt;p&gt;Before touching anything, I checked.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Framework&lt;/th&gt;
&lt;th&gt;S3 Read Logging Required?&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;SOC 2 Type II&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ISO 27001&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;GDPR&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CIS AWS Benchmark&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Nobody needs to know a Lambda function fetched a static asset at 3am. They &lt;em&gt;do&lt;/em&gt; need to know if someone deleted a production backup.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Fix
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Phase 1 — Switch to WriteOnly
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;aws cloudtrail put-event-selectors &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--trail-name&lt;/span&gt; &amp;lt;your-org-trail-arn&amp;gt; &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--event-selectors&lt;/span&gt; &lt;span class="s1"&gt;'[{"ReadWriteType":"WriteOnly","IncludeManagementEvents":true,"DataResources":[{"Type":"AWS::S3::Object","Values":["arn:aws:s3:::"]}]}]'&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--region&lt;/span&gt; us-east-1
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;"All" → "WriteOnly".&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;One word. ~$300,000 in annual savings.&lt;/p&gt;

&lt;h3&gt;
  
  
  Phase 2 — Scope to Sensitive Buckets Only
&lt;/h3&gt;

&lt;p&gt;Switching to WriteOnly eliminates ~90% of the cost. The next step is replacing the wildcard with only buckets that genuinely need auditing — PII, credentials, or compliance data.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"ReadWriteType"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"WriteOnly"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"DataResources"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"Type"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"AWS::S3::Object"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"Values"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="s2"&gt;"arn:aws:s3:::your-pii-bucket/"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="s2"&gt;"arn:aws:s3:::your-secrets-bucket/"&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This brings data event costs close to zero while keeping full audit coverage where it actually matters.&lt;/p&gt;

&lt;p&gt;At org scale, tag sensitive buckets (&lt;code&gt;security-scan: enabled&lt;/code&gt;) and use that tag to drive both CloudTrail scoping and security scanner configuration.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Real Lesson
&lt;/h2&gt;

&lt;p&gt;A security tool was onboarded and as part of its setup, full S3 data event logging was recommended — a legitimate recommendation for visibility. The team followed it. Nobody flagged the cost implication at scale.&lt;/p&gt;

&lt;p&gt;When a security team introduces a new tool, the wider team deserves to know:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What config changes does it recommend — and what do those cost at your scale?&lt;/li&gt;
&lt;li&gt;What AWS permissions does it need?&lt;/li&gt;
&lt;li&gt;Who owns the monthly bill for this tool's footprint?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Security and FinOps need to be in the same conversation when a new tool lands.&lt;/p&gt;

&lt;p&gt;Not because security is the enemy of cost — but because the most expensive line on your bill might be a setting a well-intentioned engineer enabled six months ago and never revisited.&lt;/p&gt;

&lt;p&gt;The config that cost $1,000 a month in 2024 cost $360,000 a year in 2025. The infrastructure scaled. The config didn't.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>finops</category>
      <category>cloudtrail</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
