Certified Security - Specialty

Sign Up Free or Log In to participate!

Another Step after losing keys

I would also recommend going through the list of IAM users to make sure you can account for them. If the compromised security keys gave access to IAM and create users, the bad actor could have possibly created another inconspicuous account for themselves.

0 Answers

Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!

Get Started
Who’s going to be learning?