1 Answers
Hi, the key words in this question are that you need to: trace all changes made as well as: prevent anyone attempting to conceal unauthorized activities
We use CloudTrail to trace all changes, not just to the infrastructure but any activities or API calls in your account, even the unsuccessful ones.
Config allows you to automate the evaluation of recorded configurations against desired configuration – but you need to have desired configurations to allow you to do this. It doesn’t give you a trail of who did what and when though – for that you’ll need CloudTrail.
If you selected C & D then that doesn’t prevent tampering or deletion of the evidence. So answer B must be part of the answer.
There’s a pretty good explanation here too:
https://aws.amazon.com/config/
With AWS Config, you can capture a comprehensive history of your AWS resource configuration changes to simplify troubleshooting of your operational issues. Config helps you identify the root cause of operational issues through its integration with AWS CloudTrail, a service that records events related to API calls for your account. Config leverages CloudTrail records to correlate configuration changes to particular events in your account. You can obtain the details of the event API call that invoked the change (e.g., who made the request, at what time, and from which IP address) from the CloudTrail logs.