A Security Engineer is defining the logging solution for a newly developed product. Systems Administrators and Developers need to have appropriate access to event log files in AWS CloudTrail to support and troubleshoot the product.
Which combination of controls should be used to protect against tampering with and unauthorized access to log files? (Choose two.)
DanMuniz
Highly Voted 3 years, 6 months agoITGURU51
Most Recent 1 year, 11 months agoITGURU51
2 years agodcasabona
2 years, 9 months agoRaySmith
3 years, 2 months agoRadhaghosh
3 years, 3 months agokiev
3 years, 6 months agoerezhazan1
3 years, 6 months agokj07
3 years, 6 months agodeegadaze1
3 years, 6 months agolunamycat
3 years, 7 months agogfhbox0083
3 years, 7 months agoRaySmith
3 years, 7 months agoawssecuritynewbie
3 years, 7 months ago