security-engineer video for following a security vulnerability assessment, it was discovered that cloud administrators often leave their Google Cloud CLI
Following a security vulnerability assessment, it was discovered that cloud administrators often leave their Google Cloud CLI sessions open for extended periods, posing a potential risk for exploitation by attackers. What action should you take to mitigate this risk by minimizing session durations?