An organization stores sensitive customer information in S3 buckets protected by bucket policies Recently, there have been reports that unauthorized entities within the company have been trying to access the data on those S3 buckets. The chief information security officer (CISO) would like to know which buckets are being targeted and determine who is responsible for trying to access that information.
Which steps should a SysOps administrator take to meet the CISO's requirement? (Select TWO.)
Currently there are no comments in this discussion, be the first to comment!