A Company has enabled CloudTrail logs its AWS account for audits. In addition, the IT Security department has mentioned that the logs need to be encrypted and measures be taken to check if the logs are not being modified. How can this be achieved? Choose 2 answers