Which solution will meet these requirements?
A company has a private Amazon S3 bucket that contains sensitive information.A SysOps administrator needs to keep logs of the IP addresses from authentication failures that result from attempts to access objects in the bucket.The logs must be stored so that they cannot be overwritten or deleted for 90 days.Which solution will meet these requirements?Read More →