
Ultimate access to all questions.
Your organization has recently experienced a series of security incidents, and you suspect that an attacker may have gained unauthorized access to your AWS environment. You have been tasked with using AWS services to detect and analyze these security threats. Which of the following steps should you take to effectively evaluate the findings from security services such as GuardDuty, Security Hub, and Macie?
A
Enable logging for all AWS services and review the logs manually to identify any suspicious activity.
B
Use AWS Config to track changes to your AWS resources and correlate them with findings from GuardDuty and Security Hub.
C
Disable all AWS services to prevent further unauthorized access and then perform a full audit of your environment.
D
Ignore the findings from security services and rely solely on your internal security team to identify and mitigate any threats.