security-engineer video for during a routine security review, your team identified a suspicious login attempt using a highly privileged and frequently used
During a routine security review, your team identified a suspicious login attempt using a highly privileged and frequently used service account from an unknown IP address. You need to investigate this potential security incident to respond effectively. What should you do?