A company receives an email message from the AWS Abuse team. The message states that an IAM user in the company's AWS account has had an associated access key and secret access key pair published in public code repositories.
The identified AM user is designated as a service account. The IAM user uses hardcoded credentials in a critical customer-facing production application. There are no signs of a compromise within the company's AWS account. The company's security team must address this situation by implementing a solution that minimizes application downtime.
What is the correct order of actions for the security team to take to meet these requirements?
secdaddy
Highly Voted 2 years, 5 months agojamesf
Most Recent 9 months, 4 weeks agoArad
1 year agodsmynameew
1 year, 5 months agoGreen53
2 years agovherman
2 years agomichele_scar
2 years agoToptip
2 years agoITGURU51
2 years, 1 month agoc73bf38
2 years, 3 months agoArtaggedon
2 years, 3 months agoEll89
2 years, 3 months agopaczkin
2 years, 4 months agoPatrickLi
2 years, 4 months agoyew2
2 years, 5 months agoGreen53
2 years agoSubs2021
2 years, 6 months agoamcloud
2 years, 6 months agoryogoku
2 years, 6 months ago