This is a dedicated watch page for a single video.
The IT Security team at a financial services firm has informed that a user's AWS access key has been found on the internet. As a security engineer, you must ensure that the access key is immediately disabled and the user's activities must be assessed for a potential breach. Which steps must be taken to meet the above needs?