Google Cloud Armor access logs seem relevant, but I’m unsure if they provide the level of detail needed for inspecting malicious content in IP packets.
I practiced a question similar to this, and I feel like configuring the Fluentd agent might be more about log management than direct packet inspection.
Google Cloud Armor access logs seem relevant, but I’m unsure if they provide the level of detail needed for inspecting malicious content in IP packets.
I practiced a question similar to this, and I feel like configuring the Fluentd agent might be more about log management than direct packet inspection.
I feel pretty confident about this one. The auditor should write a finding to encourage a root cause analysis, since the issue was addressed reactively rather than proactively.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Ernest
4 months agoGail
4 months agoLaticia
4 months agoIra
4 months agoChaya
4 months agoLing
5 months agoThaddeus
5 months agoTish
5 months agoHobert
5 months agoDesiree
5 months agoPhillip
5 months agoMadalyn
5 months agoShala
5 months agoShala
5 months agoRaina
5 months agoGennie
5 months ago