An organization uses AWS for its operations. It is observed that the organization's EC2 instance is
communicating with a suspicious port. Forensic investigators need to understand the patterns of the current security breach. Which log source on the AWS platform can provide investigators with data of evidentiary value during their investigation?
Submit