The security team at a company needs to follow the security requirements: Monitor all traffic leaving a particular VPC Monitor all traffic whose source is outside of the VPC The purpose of this traffic monitoring is to put in place a proper content inspection, troubleshooting, and threat monitoring solution. Which of the following options represents the best solution for the given requirement?