Ensure your logs are kept for the correct retention period, have backup copies, and have a standard operating procedure (SOP) for incident response.
Go to CloudWatch Logs

/aws/lambda/AuditLoggerDemo.S3 Object Lock
audit-demo-logs bucket.
Create Backup vault
AuditBackupVault.

Create Backup plan
AuditBackupPlan

Assign resource to plan
AuditBackupPlan → Assign resources → Resource type = S3 → ARN = arn:aws:s3:::audit-demo-logs → Assign.

Proof of data (S3 Object Lock)
aws s3api list-object-versions
–bucket audit-demo-logs
–prefix logs/
Check if any version has been deleted or overwritten without authorization.

Rebuild QuickSight dashboard
QuickSight → Datasets → select AuditLogsAthena → click Refresh → wait for SPICE import → Visualize to update the dashboard with new data.
With these steps, we have set up retention, backup/recovery, and incident response procedures for the audit system, ensuring it is always safe, recoverable, and operates smoothly.