Results -

30 votes

A Security Engineer has been informed that a user’s access key has been found on GitHub. The Engineer must ensure that this access key cannot continue to be used, and must assess whether the access key was used to perform any unauthorized activities. What steps must be taken to perform these tasks?
    Review the user's IAM permissions and delete any unrecognized or unauthorized resources 3.3% (1 vote)
    Delete the user, review the Amazon CloudWatch logs in all regions, and report the abuse. 6.7% (2 votes)
    Delete or rotate the user’s key, review the CloudTrail logs in all regions, and delete any unrecognized or unauthorized resources. 76.7% (23 votes)
    Instruct the user to remove the key from the GitHub submission, rotate keys, and re-deploy any instances that were launched 16.7% (5 votes)
Add Vote
Create Poll