Which solution will meet these requirements?
Enable Amazon GuardDuty for EKS Audit Log Monitoring. Enable AWS CloudTrail logs. Store the EKS audit logs and CloudTrail log files in an Amazon S3 bucket. Use Amazon Athena to create an external table. Use Amazon QuickSight to create a dashboard.
Enable Amazon GuardDuty for EKS Audit Log Monitoring. Enable Amazon Detective in the company’s AWS account. Enable EKS audit logs from optional source packages in Detective.
Enable Amazon CloudWatch Container Insights. Enable AWS CloudTrail logs. Store the EKS audit logs and CloudTrail log files in an Amazon S3 bucket. Use Amazon Athena to create an external table. Use Amazon QuickSight to create a dashboard.
Enable Amazon GuardDuty for EKS Audit Log Monitoring. Enable Amazon CloudWatch Container Insights and VPC Flow Logs. Enable AWS CloudTrail logs.
Explanations:
While enabling GuardDuty and CloudTrail provides monitoring and logging capabilities, it lacks direct network traffic analysis and efficient investigation of malicious behavior. Storing logs in S3 and using Athena and QuickSight adds complexity and does not minimize log management overhead.
This option enables GuardDuty for EKS audit log monitoring, which enhances security by detecting suspicious activity. Amazon Detective allows for in-depth analysis and investigation of potential malicious behavior, linking the data to provide insights across AWS services. This meets the requirements for security measures and resource behavior analysis.
Enabling CloudWatch Container Insights and storing logs in S3 with Athena for analysis may provide insights but does not specifically address security monitoring like GuardDuty or Detective. It also does not offer efficient investigation tools for potential threats, making it less suitable for the requirements.
Although this option includes GuardDuty for EKS Audit Log Monitoring and CloudWatch Container Insights, it lacks the deeper investigation capabilities provided by Amazon Detective. VPC Flow Logs help with network traffic monitoring but do not offer a summarized view of behaviors across the AWS environment as required.