The Security team believes that a former employee may have gained unauthorized access to AWS resources sometime in the past 3 months by using an identified access key.
What approach would enable the Security team to find out what the former employee may have done within AWS?
josellama2000
Highly Voted 3 years, 8 months ago[Removed]
Highly Voted 9 months, 2 weeks agoVinArc
Most Recent 8 months, 3 weeks agoRaphaello
1 year, 3 months agoMaffo102
1 year, 7 months agoBenah
1 year, 9 months agoJapanese1
1 year, 9 months agohabros
1 year, 10 months agorealdandy
1 year, 10 months agoOCHT
2 years agoITGURU51
2 years, 1 month agoKitman
2 years, 1 month agoKVK16
2 years, 5 months agojanvandermerwer
2 years, 7 months agoSonNguy3n
2 years, 9 months agotezawynn
3 years, 3 months agotipzzz
3 years, 7 months ago