Answer - B.
The AWS Documentation mentions the following.
CloudTrail logs all authenticated API requests (made with credentials) to IAM and AWS STS APIs, except DecodeAuthorizationMessage.
CloudTrail also logs nonauthenticated requests to the AWS STS actions, AssumeRoleWithSAML and AssumeRoleWithWebIdentity, and logs information provided by the identity provider.
You can use this information to map calls made by a federated user with an assumed role back to the originating external federated caller.
Option A is incorrect since the log service will not have the trail of the API calls.
Option C is incorrect since STS does not have a logging service.
Option D is incorrect since Cloudwatch metrics will not have the trail of the API calls.