
Answer-first summary for fast verification
Answer: Monitor the ECS container logs and set up alerts for any suspicious activity, such as unauthorized access attempts.
While all the options listed are important aspects of securing a microservices architecture, option A is the most directly related to monitoring and alerting for security events. Monitoring ECS container logs and setting up alerts for suspicious activity can help identify potential security incidents and enable a timely response. Options B, C, and D, while important for overall security and performance, do not directly address the monitoring and alerting aspect of the question.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
You have been tasked with designing a monitoring solution for a new microservices architecture. The system consists of multiple containers running on AWS ECS and communicates with a database hosted on Amazon RDS. Which of the following steps should be taken to ensure comprehensive monitoring and alerting for security events?
A
Monitor the ECS container logs and set up alerts for any suspicious activity, such as unauthorized access attempts.
B
Enable encryption for data at rest and in transit between the ECS containers and the RDS database.
C
Implement distributed tracing to identify performance bottlenecks in the microservices architecture.
D
Set up AWS CloudTrail to log API calls made by the ECS containers and RDS database.
No comments yet.