
Ultimate access to all questions.
A company hosts an open-source application on a public GitHub repository. During a commit, an engineer inadvertently uploaded their AWS access key and secret access key. Upon learning of the error, the manager swiftly disabled the access key. To evaluate the repercussions of this exposure with minimal administrative effort, which solution should a security engineer propose?
A
Analyze an AWS Identity and Access Management (IAM) use report from AWS Trusted Advisor to see when the access key was last used.
B
Analyze Amazon CloudWatch Logs for activity by searching for the access key.
C
Analyze VPC flow logs for activity by searching for the access key.
D
Analyze a credential report in AWS Identity and Access Management (IAM) to see when the access key was last used.