How should the SysOps administrator meet these requirements?

2 Comments

  1. Jeremy
    Author

    I would say the answer is:
    Search AWS CloudTrail event history for all events initiated with the compromised access key within the suspected timeframe.

  2. Douglas
    Author

    From my perspective, the answer is:
    Search AWS CloudTrail event history for all events initiated with the compromised access key within the suspected timeframe.

Leave a Reply

Your email address will not be published. Required fields are marked *

1 × 3 =