A company has a new AWS account that does not have AWS CloudTrail configured. The account has an IAM access key that was issued by AWS Security Token
Service (AWS STS). A security engineer discovers that the IAM access key has been compromised within the last 24 hours.
The security engineer must stop the compromised IAM access key from being used. The security engineer also must determine which activities the key has been used for so far.
What should the security engineer do to meet these requirements?
Radhaghosh
Highly Voted 3 years, 4 months agosam_live
Highly Voted 3 years, 4 months agoRaphaello
Most Recent 1 year, 3 months agoyorkicurke
1 year, 5 months agoToptip
2 years agoITGURU51
2 years, 1 month agoroguecloud
2 years, 4 months agojishrajesh
2 years, 5 months agoawsec2
2 years, 5 months agoErnstVonPappen
2 years, 9 months agosapien45
2 years, 9 months agosapien45
2 years, 9 months agoShortRound
3 years, 1 month agoShortRound
3 years, 1 month agolotfi50
3 years agoTigerInTheCloud
3 years, 2 months agoceros399
3 years, 2 months agomongiam
3 years, 1 month agotezawynn
3 years, 2 months agobabaseun
3 years, 5 months ago