A company is running multiple workloads on Amazon EC2 instances in public subnets. In a recent incident, an attacker exploited an application vulnerability on one of the EC2 instances to gain access to the instance. The company fixed the application and launched a replacement EC2 instance that contains the updated application.
The attacker used the compromised application to spread malware over the internet. The company became aware of the compromise through a notification from AWS. The company needs the ability to identify when an application that is deployed on an EC2 instance is spreading malware.
Which solution will meet this requirement with the LEAST operational effort?
ITgeek
Highly Voted 1 year, 9 months agozaazanuna
Highly Voted 1 year, 9 months agoAzureDP900
Most Recent 1 week, 2 days agowoorkim
2 months, 2 weeks agoRaphaello
9 months agopatanjali
10 months, 1 week agomarfee
11 months, 1 week agoJoseCC
1 year, 5 months agoMishranihal737
1 year, 5 months agosilviahdz
1 year, 8 months agodremm
1 year, 9 months agothat1guy
1 year, 9 months agodremm
1 year, 9 months agohelloworldabc
1 year, 9 months ago