A company has a strict policy against using root credentials. The company’s security team wants to be alerted as soon as possible when root credentials are used to sign in to the AWS Management Console.
How should the security team achieve this goal?
phmeeeee
2 months, 3 weeks agoTareDHakim
6 months agoIPLogic
7 months agoIPLogic
7 months ago723993f
7 months, 1 week ago