Full AWS Practitioner Certification Question

Which of the following is an example of a detective control in an information security environment?