This is a dedicated watch page for a single video.
As a security engineer for an IT company, you have received a notice from AWS that the resources for your company's AWS account were reported for abusive activity. What should be your course of action after receiving the notice?