Which set of actions will identify the suspect attacker’s IP address for future occurrences?

1 Comment

  1. Roger
    Author

    I assess that the answer is:
    Configure the web ACL to send logs to Amazon Kinesis Data Firehose, which delivers the logs to an S3 bucket. Use Amazon Athena to query the logs and find the new-user-creation.php occurrences.

Leave a Reply to Roger Cancel reply

Your email address will not be published. Required fields are marked *

19 − seventeen =