A Company is using AWS Key Management Service (KMS) to maintain their keys. The Company's CISO wants all requests for key management made to the KMS to be audited. As a Solution Architect how can you meet the security requirement?