A company has an Amazon Redshift cluster with database audit logging enabled. A security audit shows that raw SQL statements that run against the Redshift cluster are being logged to an Amazon S3 bucket. The security team requires that authentication logs are generated for use in an intrusion detection system (IDS), but the security team does not require SQL queries.
What should a database specialist do to remediate this issue?
KikiNoviandi
1 year, 8 months agoRam_xyz
1 year, 8 months agomarll88
1 year, 8 months ago