A company asks a SysOps administrator to ensure that AWS CloudTrail files are not tampered with after they are created. Currently, the company uses AWS
Identity and Access Management (IAM) to restrict access to specific trails. The company's security team needs the ability to trace the integrity of each file.
What is the MOST operationally efficient solution that meets these requirements?
Finger41
Highly Voted 3 years, 6 months agomk1523
Most Recent 4 months agogehadg
6 months ago2f0a02c
1 year, 5 months agoAndrew_A
1 year, 10 months agojoesome
1 year, 10 months agomavhandu
2 years, 1 month agoBietTuot
2 years, 4 months agoMrMLB
2 years, 4 months agomichaldavid
2 years, 4 months agopravinb
2 years, 4 months agosassy69
2 years, 6 months agoSurferbolt
2 years, 6 months agoCHRIS12722222
2 years, 7 months agoprincajen
2 years, 7 months agoMikilo
2 years, 11 months agohammering
3 years, 1 month ago