
Ultimate access to all questions.
Consider a scenario where a company experiences a security incident involving unauthorized access to their AWS RDS database. How would you use AWS CloudTrail and AWS Config to trace the incident and what steps would you take to secure the database post-incident? Describe the process from detection to recovery.
A
Use only AWS CloudTrail for basic logging without detailed tracing.
B
Leverage both AWS CloudTrail for event history and AWS Config for resource configurations to trace the incident and implement security enhancements post-incident.
C
Ignore AWS Config and rely solely on AWS CloudTrail.
D
Assume no breach occurred without investigation.