You want to monitor multiple AWS accounts for threats centrally using GuardDuty. What is the best approach?
AUse GuardDuty's multi-account feature with a master account to manage findings centrally
BEnable GuardDuty separately in each account and region, then aggregate findings manually
CCreate IAM roles in each account to share logs with a central S3 bucket for GuardDuty analysis
DDisable GuardDuty in member accounts and rely on CloudTrail logs only