Which actions must the Security Engineer take to access these audit findings?
(Choose three.)
Ensure CloudTrail log file validation is turned on.
Configure an S3 lifecycle rule to periodically archive CloudTrail logs into Glacier for long-term storage.
Use an S3 bucket with tight access controls that exists in a separate account.
Use Amazon Inspector to monitor the file integrity of CloudTrail log files.
Request a certificate through ACM and use a generated certificate private key to encrypt CloudTrail log files.
Encrypt the CloudTrail log files with server-side encryption AWS KMS-managed keys (SSE-KMS).
Explanations:
Enabling CloudTrail log file validation ensures that logs are protected against tampering. This feature allows for the verification of the integrity of log files by using a SHA-256 hash to detect any changes made to the logs.
While archiving CloudTrail logs in Glacier can help with long-term storage, it does not directly enhance the protection against tampering or unauthorized access. The focus should be on securing access controls and validation rather than simply moving logs to a different storage tier.
Using an S3 bucket with tight access controls in a separate account can significantly enhance the security of CloudTrail logs. This setup minimizes the risk of unauthorized access and limits exposure to potential breaches in the primary account.
Amazon Inspector is primarily designed for assessing application vulnerabilities and compliance but does not specifically monitor file integrity for CloudTrail logs. Other tools like AWS Config or custom scripts would be more suitable for monitoring log file integrity.
Requesting a certificate through ACM and using its private key for encryption is not a recommended practice for CloudTrail log protection. Instead, AWS provides built-in encryption options like SSE-KMS for secure storage. This option adds unnecessary complexity and does not align with best practices for log security.
Encrypting CloudTrail log files with server-side encryption using AWS KMS-managed keys (SSE-KMS) enhances security by ensuring that the logs are encrypted at rest. This prevents unauthorized access to the log data, ensuring confidentiality and integrity.