
Answer-first summary for fast verification
Answer: Leverage both AWS CloudTrail for event history and AWS Config for resource configurations to trace the incident and implement security enhancements post-incident.
Option B is correct because it uses both AWS CloudTrail and AWS Config for a comprehensive tracing and recovery process, which is essential for securing the database post-incident.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Consider a scenario where a company experiences a security incident involving unauthorized access to their AWS RDS database. How would you use AWS CloudTrail and AWS Config to trace the incident and what steps would you take to secure the database post-incident? Describe the process from detection to recovery.
A
Use only AWS CloudTrail for basic logging without detailed tracing.
B
Leverage both AWS CloudTrail for event history and AWS Config for resource configurations to trace the incident and implement security enhancements post-incident.
C
Ignore AWS Config and rely solely on AWS CloudTrail.
D
Assume no breach occurred without investigation.
No comments yet.