Your company has experienced a security breach involving multiple compromised resources. How would you use Amazon Detective to conduct a root cause analysis? Describe the steps and the benefits of using Detective over traditional log analysis methods.