A company's security engineer receives an abuse notification from AWS. The notification indicates that malware is being hosted in the AWS account. The security engineer investigated the issue and found an unauthorized Amazon S3 bucket. Which combination of steps should the security engineer take to MINIMIZE the consequences of this compromise? (Select THREE.)