An attack surface is refers to all the potential entry points an attacker could exploit to gain unauthorized access to a system, network, or data.| wiz.io
This document provides a conceptual overview of Cloud Audit Logs.| Google Cloud
AWS CloudTrail enables governance, compliance, operational auditing, and risk auditing of your AWS account.| Amazon Web Services, Inc.
man7.org > Linux > man-pages| man7.org