
Ultimate access to all questions.
You have been tasked with designing a monitoring solution for a new microservices architecture. The system consists of multiple containers running on AWS ECS and communicates with a database hosted on Amazon RDS. Which of the following steps should be taken to ensure comprehensive monitoring and alerting for security events?
A
Monitor the ECS container logs and set up alerts for any suspicious activity, such as unauthorized access attempts.
B
Enable encryption for data at rest and in transit between the ECS containers and the RDS database.
C
Implement distributed tracing to identify performance bottlenecks in the microservices architecture.
D
Set up AWS CloudTrail to log API calls made by the ECS containers and RDS database.