
Ultimate access to all questions.
In the event of a security incident involving unauthorized access to sensitive data in an AWS S3 bucket, how would you use AWS CloudTrail and Amazon Athena to analyze the logs and identify the source of the breach? Describe the steps you would take to ensure a detailed and efficient investigation.
A
Use only AWS CloudTrail for basic logging without detailed analysis.
B
Leverage AWS CloudTrail for logging and Amazon Athena for querying the logs to identify the breach source and extent.
C
Ignore AWS CloudTrail and rely on manual log reviews.
D
Assume no breach occurred without investigation.