A company’s security team requests that network traffic be captured in VPC Flow Logs. The logs will be frequently accessed for 90 days and then accessed intermittently.
What should a solutions architect do to meet these requirements when configuring the logs?
cookieMr
Highly Voted 1 year, 8 months agoLuckyAro
Highly Voted 2 years, 1 month agomanabpokhrel7
Most Recent 4 months, 3 weeks agoRicardoD
1 year agoTariqKipkemei
1 year, 5 months agoGuru4Cloud
1 year, 5 months agoanimefan1
1 year, 8 months agomarkw92
1 year, 8 months agoBmarodi
1 year, 9 months agopentium75
1 year, 2 months agoocbn3wby
2 years, 1 month agotechhb
2 years, 1 month agomp165
2 years, 1 month agoswolfgang
2 years, 1 month agomhmt4438
2 years, 1 month agolaicos
2 years, 1 month agoParsons
2 years, 1 month agoAninina
2 years, 1 month ago