During an internal audit following suspected misuse of privileged credentials at a technology services firm, investigators must review detailed activity records related to configuration changes, API calls, and access attempts made against cloud-hosted resources. The organization operates entirely within a single cloud provider ' s infrastructure, and the investigation requires a native service that records management-plane actions with precise timestamps, source addresses, and request parameters for later reconstruction of user activity. Which platform would investigators rely on to reconstruct this activity timeline?
Submit