Which set of actions will immediately remediate the security issue without impacting the application’s normal workflow?
A company has an application that generates reports and stores them in an Amazon S3 bucket.When a user accesses their report, the application generates a signed URL to allow the user to download the report.The company’s security team has discovered that the files are public and that anyone can download them without authentication.The company has suspended the generation of new reports until the problem is resolved.Which set of actions will immediately remediate the security issue without impacting the application’s normal workflow?Read More →