Which solution meets these requirements?
Analyze an AWS Identity and Access Management (IAM) use report from AWS Trusted Advisor to see when the access key was last used.
Analyze Amazon CloudWatch Logs for activity by searching for the access key.
Analyze VPC flow logs for activity by searching for the access key.
Analyze a credential report in AWS Identity and Access Management (IAM) to see when the access key was last used.
Explanations:
Analyzing an IAM use report from AWS Trusted Advisor provides general information about IAM usage but does not specifically indicate when an access key was used. It is not the most direct method for assessing the immediate impact of the exposed access key.
Analyzing Amazon CloudWatch Logs may provide insights into API calls made, but it requires detailed knowledge of the logs and does not directly focus on the specific access key, making it more complex and time-consuming.
Analyzing VPC flow logs for activity does not directly provide information about the usage of the AWS access key. VPC flow logs are more about network traffic rather than API calls associated with the access key, making this option less relevant.
Analyzing a credential report in AWS IAM will provide specific details about the usage of access keys, including when they were last used, which is essential for assessing the impact of the exposed access key with minimal managerial overhead.