
Explanation:
While all the options listed are important aspects of securing a microservices architecture, option A is the most directly related to monitoring and alerting for security events. Monitoring ECS container logs and setting up alerts for suspicious activity can help identify potential security incidents and enable a timely response. Options B, C, and D, while important for overall security and performance, do not directly address the monitoring and alerting aspect of the question.
Ultimate access to all questions.
You have been tasked with designing a monitoring solution for a new microservices architecture. The system consists of multiple containers running on AWS ECS and communicates with a database hosted on Amazon RDS. Which of the following steps should be taken to ensure comprehensive monitoring and alerting for security events?
A
Monitor the ECS container logs and set up alerts for any suspicious activity, such as unauthorized access attempts.
B
Enable encryption for data at rest and in transit between the ECS containers and the RDS database.
C
Implement distributed tracing to identify performance bottlenecks in the microservices architecture.
D
Set up AWS CloudTrail to log API calls made by the ECS containers and RDS database.
No comments yet.