Which steps should be taken to investigate the suspected compromise?

1 Comment

  1. Ruth
    Author

    I calculate that the answer is:
    Initiate an Amazon Elastic Block Store volume snapshot of all volumes on the EC2 instance.

Leave a Reply

Your email address will not be published. Required fields are marked *

5 × 3 =