A company recently performed an annual security assessment of its AWS environment. The assessment showed the audit logs are not available beyond 90 days and that unauthorized changes to IAM policies are made without detection.
How should a Security Engineer resolve these issues?
Kitty0403
Highly Voted 3 years, 8 months agoucsdmiami2020
3 years, 7 months agoucsdmiami2020
3 years, 7 months agoPeppaPig
Highly Voted 3 years, 8 months agoRaphaello
Most Recent 1 year, 3 months agoaddy_prepare
1 year, 9 months agoITGURU51
2 years, 1 month agosapien45
2 years, 9 months agodcasabona
2 years, 10 months agojackfei
3 years agoTigerInTheCloud
3 years, 2 months agoceros399
3 years, 2 months agoLaLune
3 years, 5 months agomunish3420
3 years, 6 months agokiev
3 years, 7 months agoskipbaylessfor3
3 years, 7 months agosanjaym
3 years, 7 months agokely
3 years, 7 months agoBanton88
3 years, 7 months agoavland
3 years, 7 months ago