A company's security team requests that network traffic be captured in VPC Flow Logs. The logs will be frequently accessed for 90 days and then accessed intermittently.
What should a solutions architect do to meet these requirements when configuring the logs?
Hizumi
Highly Voted 3 years, 7 months agochael88
2 years, 10 months agozammusaz304
2 years, 8 months agopatriktre
Highly Voted 3 years, 6 months agoFlyingHawk
Most Recent 5 months, 1 week agoMatAlves
7 months, 4 weeks agoBECAUSE
1 year, 11 months agoSkyZeroZx
1 year, 12 months agoironbat
2 years agorude7
2 years, 8 months agoJennie95
2 years, 8 months agokar_123
2 years, 8 months agomax_01
2 years, 8 months agoGripZA
2 years, 8 months agobalmo
2 years, 7 months agoRoot_Access
2 years, 8 months agoetheng1970
2 years, 9 months agojyrajan69
2 years, 9 months agosdk1990
2 years, 10 months agonaveenagurjara
2 years, 10 months agojyrajan69
2 years, 9 months ago