This is a dedicated watch page for a single video.
An e-commerce company receives an AWS Abuse notification stating that an IAM user's access key, used by an inventory management system, may have been compromised. The security manager needs to address the potential security breach while ensuring minimal service interruption to the inventory system. What would be the optimal strategy to address this situation?