Ultimate access to all questions.
A company has identified security issues related to specific hosts and host header combinations that have impacted their business operations. To address these issues, they have implemented AWS WAF web ACLs and now require a log analysis solution to monitor and analyze AWS WAF logs centrally. The solution must enable the filtering of requests by specific hosts. A security engineer has initiated the process of enabling access logging for the AWS WAF web ACLs. What is the next step the security engineer should take to achieve this log analysis with the highest operational efficiency?