Ultimate access to all questions.
Your organization has recently implemented AWS IAM Access Analyzer to identify and mitigate potential security risks related to IAM policies. You have identified a policy that grants excessive permissions to a specific IAM user. Which of the following actions should you take to address this issue?