
AWS Certified Security - Specialty
Get started today
Ultimate access to all questions.
You have been tasked with designing a monitoring solution for a new microservices architecture. The system consists of multiple containers running on AWS ECS and communicates with a database hosted on Amazon RDS. Which of the following steps should be taken to ensure comprehensive monitoring and alerting for security events?
You have been tasked with designing a monitoring solution for a new microservices architecture. The system consists of multiple containers running on AWS ECS and communicates with a database hosted on Amazon RDS. Which of the following steps should be taken to ensure comprehensive monitoring and alerting for security events?
Explanation:
While all the options listed are important aspects of securing a microservices architecture, option A is the most directly related to monitoring and alerting for security events. Monitoring ECS container logs and setting up alerts for suspicious activity can help identify potential security incidents and enable a timely response. Options B, C, and D, while important for overall security and performance, do not directly address the monitoring and alerting aspect of the question.