A company has a strict policy against using root credentials. The company’s security team wants to be alerted as soon as possible when root credentials are used to sign in to the AWS Management Console.
How should the security team achieve this goal?
phmeeeee
3 weeks, 2 days agoTareDHakim
3 months, 4 weeks agoIPLogic
4 months, 4 weeks agoIPLogic
4 months, 4 weeks ago723993f
5 months, 1 week ago