
Ultimate access to all questions.
A company has identified security issues related to specific hosts and host header combinations that have impacted their business operations. To address these issues, they have implemented AWS WAF web ACLs and now require a log analysis solution to monitor and analyze AWS WAF logs centrally. The solution must enable the filtering of requests by specific hosts. A security engineer has initiated the process of enabling access logging for the AWS WAF web ACLs. What is the next step the security engineer should take to achieve this log analysis with the highest operational efficiency?
A
Specify Amazon Redshift as the destination for the access logs. Deploy the Amazon Athena Redshift connector. Use Athena to query the data from Amazon Redshift and to filter the logs by host.
B
Specify Amazon CloudWatch as the destination for the access logs. Use Amazon CloudWatch Logs Insights to design a query to filter the logs by host.
C
Specify Amazon CloudWatch as the destination for the access logs. Export the CloudWatch logs to an Amazon S3 bucket. Use Amazon Athena to query the logs and to filter the logs by host.
D
Specify Amazon CloudWatch as the destination for the access logs. Use Amazon Redshift Spectrum to query the logs and to filter the logs by host.