
Answer-first summary for fast verification
Answer: Analyze Amazon CloudWatch Logs for activity by searching for the access key.
The correct answer is B. Analyzing Amazon CloudWatch Logs for activity by searching for the access key is the most effective way to assess the impact of the exposed access key. This method provides detailed logs of all API activity associated with the key, making it easier to identify and respond to any unauthorized usage. Options A and D involve reports that do not provide the required granularity of data to fully understand the activities performed with the access key. Option C, VPC flow logs, are not suitable for this purpose as they primarily capture network traffic information and not API calls or resource access details.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
A company hosts an open-source application on a public GitHub repository. During a commit, an engineer inadvertently uploaded their AWS access key and secret access key. Upon learning of the error, the manager swiftly disabled the access key. To evaluate the repercussions of this exposure with minimal administrative effort, which solution should a security engineer propose?
A
Analyze an AWS Identity and Access Management (IAM) use report from AWS Trusted Advisor to see when the access key was last used.
B
Analyze Amazon CloudWatch Logs for activity by searching for the access key.
C
Analyze VPC flow logs for activity by searching for the access key.
D
Analyze a credential report in AWS Identity and Access Management (IAM) to see when the access key was last used.