List of questions
Related questions
Question 84 - SCS-C02 discussion
A company manages multiple IAM accounts using IAM Organizations. The company's security team notices that some member accounts are not sending IAM CloudTrail logs to a centralized Amazon S3 logging bucket. The security team wants to ensure there is at least one trail configured (or all existing accounts and for any account that is created in the future.
Which set of actions should the security team implement to accomplish this?
A.
Create a new trail and configure it to send CloudTrail logs to Amazon S3. Use Amazon EventBridge (Amazon CloudWatch Events) to send notification if a trail is deleted or stopped.
B.
Deploy an IAM Lambda function in every account to check if there is an existing trail and create a new trail, if needed.
C.
Edit the existing trail in the Organizations master account and apply it to the organization.
D.
Create an SCP to deny the cloudtrail:Delete' and cloudtrail:Stop' actions. Apply the SCP to all accounts.
Your answer:
0 comments
Sorted by
Leave a comment first