How should the SysOps administrator meet these requirements?

1 Comment

  1. Jeremy
    Author

    I would say the answer is:
    Search AWS CloudTrail event history for all events initiated with the compromised access key within the suspected timeframe.

Leave a Reply to Jeremy Cancel reply

Your email address will not be published. Required fields are marked *

three × 4 =