A company has a history of their access logs stored in their S3 bucket. The company’s data engineer filtered out the dataset to only contain pairs of (user/IP) where it contains the name of the IAM user along with the IP address he used to access a specific service. The company recently suffered from a data breach coming from specific IP addresses which were recorded by the security team. What approach should the company take to stop further breaches from these specific IP addresses in the least amount of time?