A company’s security team requests that network traffic be captured in VPC Flow Logs. The logs will be frequently accessed for 90 days and then accessed intermittently.
What should a solutions architect do to meet these requirements when configuring the logs?
cookieMr
Highly Voted 1 year, 6 months agoLuckyAro
Highly Voted 2 years agomanabpokhrel7
Most Recent 3 months agoRicardoD
11 months agoTariqKipkemei
1 year, 3 months agoGuru4Cloud
1 year, 4 months agoanimefan1
1 year, 6 months agomarkw92
1 year, 7 months agoBmarodi
1 year, 7 months agopentium75
1 year agoocbn3wby
1 year, 11 months agotechhb
2 years agomp165
2 years agoswolfgang
2 years agomhmt4438
2 years agolaicos
2 years agoParsons
2 years agoAninina
2 years ago