A company experienced a breach of highly confidential personal information due to permission issues on an Amazon S3 bucket. The Information Security team has tightened the bucket policy to restrict access. Additionally, to be better prepared for future attacks, these requirements must be met:
✑ Identify remote IP addresses that are accessing the bucket objects.
✑ Receive alerts when the security policy on the bucket is changed.
✑ Remediate the policy changes automatically.
Which strategies should the Solutions Architect use?
Nemer
Highly Voted 3 years, 7 months agokpcert
3 years, 5 months agoSkyZeroZx
Most Recent 1 year, 10 months agojhonivy
2 years, 3 months agojanvandermerwer
2 years, 5 months agoAwsBRFan
2 years, 7 months agocldy
3 years, 4 months agopcops
3 years, 5 months agosashenka
3 years, 5 months agoWhyIronMan
3 years, 5 months agodigimaniac
3 years, 5 months agoPupu86
3 years, 5 months agoblackgamer
3 years, 5 months agoalisyech
3 years, 6 months agoKian1
3 years, 6 months agoEbi
3 years, 6 months agopetebear55
3 years, 6 months agopetebear55
3 years, 6 months agopetebear55
3 years, 6 months agovbal
3 years, 4 months ago