Which solution will meet these requirements?

2 Comments

  1. Christian
    Author

    I map out that the answer is:
    Create a new access key for the IAM user. Update the latest application version to use the new access key. Deactivate the compromised access key.

  2. Alice
    Author

    From my perspective, the answer is:
    Create a new access key for the IAM user. Update the latest application version to use the new access key. Deactivate the compromised access key.

Leave a Reply

Your email address will not be published. Required fields are marked *

18 − 15 =