A company's security information events management (SIEM) tool receives new AWS CloudTrail logs from an Amazon S3 bucket that is configured to send all object created event notifications to an Amazon SNS topic. An Amazon SQS queue is subscribed to this SNS topic. The company's SIEM tool then polls this SQS queue for new messages using an IAM role and fetches new log events from the S3 bucket based on the SQS messages.
After a recent security review that resulted in restricted permissions, the SIEM tool has stopped receiving new CloudTrail logs.
Which of the following are possible causes of this issue? (Choose three.)
DayQuil
Highly Voted 3 years, 9 months agoDahMac
Highly Voted 3 years, 8 months agoRaphaello
Most Recent 1 year, 4 months agodterefenko
1 year, 8 months agoCirusD
2 years agoOCHT
2 years agoMaya77
2 years, 4 months agojishrajesh
2 years, 6 months agoRadhaghosh
3 years, 5 months agoSamir710413
2 years, 7 months agoJames2022
3 years, 5 months agosapien45
2 years, 10 months agoIMAHM
3 years, 7 months agoHungdv
3 years, 9 months agocldy
3 years, 9 months ago