The Security team believes that a former employee may have gained unauthorized access to AWS resources sometime in the past 3 months by using an identified access key.
What approach would enable the Security team to find out what the former employee may have done within AWS?
josellama2000
Highly Voted 3 years, 7 months ago[Removed]
Highly Voted 8 months agoVinArc
Most Recent 7 months, 1 week agoRaphaello
1 year, 1 month agoMaffo102
1 year, 5 months agoBenah
1 year, 7 months agoJapanese1
1 year, 8 months agohabros
1 year, 8 months agorealdandy
1 year, 9 months agoOCHT
1 year, 11 months agoITGURU51
1 year, 11 months agoKitman
1 year, 11 months agoKVK16
2 years, 3 months agojanvandermerwer
2 years, 5 months agoSonNguy3n
2 years, 8 months agotezawynn
3 years, 1 month agotipzzz
3 years, 6 months ago