Sensitive company data is found leaked on the internet, and the security team didn't
get any alert and is unsure of how the breach occurred.
Which logs would be a preferable starting point for an investigation?
Identity and Access Management
Application
Resource Management
Endpoint
Submit