
Ultimate access to all questions.
Your company is implementing a new containerized application using Amazon Elastic Container Service for Kubernetes (EKS). Which of the following steps should be taken to ensure comprehensive monitoring and alerting for security events in the EKS environment?
A
Enable Amazon EKS logging and monitoring to collect logs and metrics from the Kubernetes environment.
B
Implement a custom script to scan for vulnerabilities in the EKS cluster and generate alerts based on the findings.
C
Monitor the performance metrics of the EKS cluster, such as CPU and memory usage, to identify potential issues.
D
Set up Amazon CloudWatch alarms to monitor the usage of EKS resources and generate alerts based on predefined thresholds.