What should the security engineer do to meet these requirements?

1 Comment

  1. Justin
    Author

    It seems to me that the answer is:
    In the CloudTrail console, under CloudTrail event history, search by access key for the compromised key, view the correlated events, and identify which IAM role the key belongs to. In the IAM console, revoke all active sessions for that IAM role.

Leave a Reply to Justin Cancel reply

Your email address will not be published. Required fields are marked *

6 − three =