
Ultimate access to all questions.
Your organization has recently implemented AWS IAM Access Analyzer to identify and mitigate potential security risks related to IAM policies. You have identified a policy that grants excessive permissions to a specific IAM user. Which of the following actions should you take to address this issue?
A
Delete the IAM user and create a new one with the appropriate permissions.
B
Modify the IAM policy to remove the excessive permissions and apply the changes to the IAM user.
C
Ignore the findings from IAM Access Analyzer and continue using the existing IAM policy.
D
Disable IAM Access Analyzer and rely solely on your internal security team to identify and mitigate IAM policy risks.