This is a dedicated watch page for a single video.
An administrative user accidentally exposed an access key ID and secret access key to a public support forum. The user notified the security team about the incident after removing the exposed credentials from the forum. Which initial steps should a security engineer take to mitigate the exposure without interrupting operations? (Select TWO.)