Which combination of steps should the security engineer take to gather this information?

1 Comment

  1. Virginia
    Author

    I opine that the answer is:
    Configure Amazon Macie to identify any objects in DOC-EXAMPLE-BUCKET1 that contain PII and that were available to the access key.

Leave a Reply to Virginia Cancel reply

Your email address will not be published. Required fields are marked *

20 − nineteen =