A company requires that all activity in its AWS account be logged using AWS CloudTrail. Additionally, a SysOps administrator must know when CloudTrail log files are modified or deleted.
How should the SysOps administrator meet these requirements?
CloudTrail Log File Integrity Validation:
AWS CloudTrail provides a feature for log file integrity validation to ensure logs have not been modified or deleted.
Steps to Enable and Validate:
Enable Log File Integrity Validation:
Go to the CloudTrail Console.
Select or create a trail.
In the trail settings, enable Log file validation.
Use the AWS CLI for Validation:
Use the following CLI command:
aws cloudtrail validate-logs --trail-name <trail-name>
This command validates the digest files generated by CloudTrail against the log files.
Why Other Options Are Incorrect:
B: Using the AWS CloudTrail Processing Library is unnecessary for validation.
C: CloudTrail Insights is designed to identify unusual activity, not monitor log modifications.
D: Amazon CloudWatch Logs cannot directly monitor CloudTrail logs for integrity.
Stanford
1 months agoChristiane
27 days agoFranklyn
1 months agoBulah
1 months agoDevon
13 days agoStefanie
27 days agoJuliana
2 months agoLashawnda
2 months agoYolande
2 months agoFletcher
2 months agoSvetlana
2 months agoAnnice
2 months agoBettina
2 months agoDarnell
1 months agoAdrianna
2 months agoDahlia
2 months ago