The Security team believes that a former employee may have gained unauthorized access to AWS resources sometime in the past 3 months by using an identified access key.
What approach would enable the Security team to find out what the former employee may have done within AWS?
josellama2000
Highly Voted 3 years, 10 months agolearnaws16
Highly Voted 3 years, 10 months agobluegardentower
Most Recent 1 week, 4 days agoyash3423
3 weeks, 2 days agothanhpolimi
1 month, 3 weeks agoVinArc
10 months, 4 weeks agoRaphaello
1 year, 5 months agoMaffo102
1 year, 9 months agoBenah
1 year, 11 months agoJapanese1
1 year, 12 months agohabros
2 years agorealdandy
2 years agoOCHT
2 years, 2 months agoITGURU51
2 years, 3 months agoKitman
2 years, 3 months agoKVK16
2 years, 7 months agojanvandermerwer
2 years, 9 months ago