security video for a developer who was recently fired by a company has a personal laptop that contains the SSH keys used to access multiple Amazon EC2
A developer who was recently fired by a company has a personal laptop that contains the SSH keys used to access multiple Amazon EC2 instances. The security team need to ensure the developer is unable to access the EC2 instances. How can a security engineer protect the running EC2 instances?