A company asks a SysOps administrator to ensure that AWS CloudTrail files are not tampered with after they are created. Currently, the company uses AWS
Identity and Access Management (IAM) to restrict access to specific trails. The company's security team needs the ability to trace the integrity of each file.
What is the MOST operationally efficient solution that meets these requirements?
Finger41
Highly Voted 3 years agogehadg
Most Recent 2 weeks, 1 day ago2f0a02c
11 months, 3 weeks agoAndrew_A
1 year, 5 months agojoesome
1 year, 5 months agomavhandu
1 year, 8 months agoBietTuot
1 year, 11 months agoMrMLB
1 year, 11 months agomichaldavid
1 year, 11 months agopravinb
1 year, 11 months agosassy69
2 years, 1 month agoSurferbolt
2 years, 1 month agoCHRIS12722222
2 years, 1 month agoprincajen
2 years, 2 months agoMikilo
2 years, 5 months agohammering
2 years, 7 months agoMrkJobs
2 years, 10 months ago