Multiple Choice
A company has several accounts between different teams and wants to increase its auditing and compliance capabilities. The accounts are managed through AWS Organizations. Management wants to provide the security team with secure access to the account logs while also restricting the possibility for the logs to be modified. How can a SysOps administrator achieve this is with the LEAST amount of operational overhead?
A) Store AWS CloudTrail logs in Amazon S3 in each account. Create a new account to store compliance data and replicate the objects into the newly created account.
B) Store AWS CloudTrail logs in Amazon S3 in each account. Create an IAM user with read-only access to the CloudTrail logs.
C) From the master account, create an organization trail using AWS CloudTrail and apply it to all Regions. Use IAM roles to restrict access.
D) Use an AWS CloudFormation stack set to create an AWS CloudTrail trail in every account and restrict permissions to modify the logs.
Correct Answer:

Verified
Correct Answer:
Verified
Q882: A company currently has a single AWS
Q883: An organization, which has the AWS account
Q884: A user has enabled session stickiness with
Q885: A company has an application database on
Q886: A user has launched an EC2 instance.
Q888: A sys admin has created a shopping
Q889: When the AWS Cloud infrastructure experiences an
Q890: An organization has setup Auto Scaling with
Q891: A user has created an Auto Scaling
Q892: A company is releasing a new static