Video upload date:  · Duration: PT1H46M27S  · Language: EN

An e-commerce company receives an AWS Abuse aws video

security video for an e-commerce company receives an AWS Abuse notification stating that an IAM user's access key, used by an inventory management system, may

This is a dedicated watch page for a single video.

Full Certification Question

An e-commerce company receives an AWS Abuse notification stating that an IAM user's access key, used by an inventory management system, may have been compromised. The security manager needs to address the potential security breach while ensuring minimal service interruption to the inventory system. What would be the optimal strategy to address this situation?