Which solution will meet these requirements?

1 Comment

  1. Christian
    Author

    I map out that the answer is:
    Create a new access key for the IAM user. Update the latest application version to use the new access key. Deactivate the compromised access key.

Leave a Reply

Your email address will not be published. Required fields are marked *

17 + 6 =