Ultimate access to all questions.
A company's application generates reports and stores them in an Amazon S3 bucket. When users access their reports, the application creates signed URLs for downloading. The security team found that these files are publicly accessible without authentication, leading the company to halt new report generation until the issue is fixed. What measures can be taken to immediately address this security vulnerability without disrupting the application's usual operations?