A company suspects that an attacker has exploited an overly permissive role to export credentials from Amazon EC2 instance metadat
a. The company uses Amazon GuardDuty and AWS Audit Manager. The company has enabled AWS CloudTrail logging and Amazon CloudWatch logging for all of its AWS accounts.
A security engineer must determine if the credentials were used to access the company's resources from an external account.
Which solution will provide this information?
Owen
3 months agoLigia
1 months agoTamie
1 months agoNancey
2 months agoHoward
3 months agoVivienne
3 months agoHana
1 months agoMarsha
1 months agoLenna
1 months agoMaile
2 months agoTamekia
3 months agoCasie
2 months agoFidelia
2 months agoZack
3 months agoRodney
3 months agoFelix
3 months agoZack
4 months agoAlmeta
4 months agoJohnson
2 months agoVicky
2 months agoChaya
3 months agoTyisha
3 months ago