A company is evaluating its security posture. In the past, the company has observed issues with specific hosts and host header combinations that affected the company's business. The company has configured AWS WAF web ACLs as an initial step to mitigate these issues.
The company must create a log analysis solution for the AWS WAF web ACLs to monitor problematic activity. The company wants to process all the AWS WAF logs in a central location. The company must have the ability to filter out requests based on specific hosts.
A security engineer starts to enable access logging for the AWS WAF web ACLs.
What should the security engineer do next to meet these requirements with the MOST operational efficiency?
vikasj1in
9 months, 2 weeks ago3633f8f
10 months, 1 week agoWeepingMaplte
10 months, 1 week agoAgboolaKun
11 months agoAamee
11 months agolmimi
11 months ago[Removed]
11 months ago[Removed]
11 months agooioi
11 months ago