A company is evaluating its security posture. In the past, the company has observed issues with specific hosts and host header combinations that affected the company's business. The company has configured AWS WAF web ACLs as an initial step to mitigate these issues.
The company must create a log analysis solution for the AWS WAF web ACLs to monitor problematic activity. The company wants to process all the AWS WAF logs in a central location. The company must have the ability to filter out requests based on specific hosts.
A security engineer starts to enable access logging for the AWS WAF web ACLs.
What should the security engineer do next to meet these requirements with the MOST operational efficiency?
vikasj1in
10 months, 3 weeks ago3633f8f
11 months, 3 weeks agoWeepingMaplte
11 months, 3 weeks agoAgboolaKun
1 year agoAamee
1 year agolmimi
1 year ago[Removed]
1 year ago[Removed]
1 year agooioi
1 year ago