This is a dedicated watch page for a single video.
An organization is implementing a configuration management strategy to ensure consistency and compliance across its cloud infrastructure. The security team needs to quickly detect unauthorized changes to system configurations and ensure that resources remain in a known and approved state. Which of the following solutions would BEST meet this requirement?