A company runs an application that hosts critical data for several clients. The company uses flaws CloudTrail to track user activities on various flaws resources. To meet new security requirements, the company needs to protect the CloudTrail log files from being modified, deleted, or forged. Which solution will meet these requirement?

QuestionsCategory: SOA-C02A company runs an application that hosts critical data for several clients. The company uses flaws CloudTrail to track user activities on various flaws resources. To meet new security requirements, the company needs to protect the CloudTrail log files from being modified, deleted, or forged. Which solution will meet these requirement?
Admin Staff asked 8 months ago
A company runs an application that hosts critical data for several clients. The company uses flaws CloudTrail to track user activities on various flaws resources. To meet new security requirements, the company needs to protect the CloudTrail log files from being modified, deleted, or forged.
Which solution will meet these requirement?

A. Enable CloudTrail log file integrity validation.

B. Use Amazon S3 MFA Delete on the S3 bucket where the CloudTrail log files are stored.

C. Use Amazon S3 Versioning to keep all versions of the CloudTrail log files.

D. Use flaws Key Management Service (flaws KMS) security keys to secure the CloudTrail log files.








 

Correct Answer: C

This question is in SOA-C02 exam
For getting AWS Certified SysOps Administrator - Associate

Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.