You are tasked with isolating AWS resources during a security incident. Which AWS services and features would you use to achieve this, and what steps would you follow?
Simulated
Explanation:
Option C is the most effective and scalable method to isolate resources during an incident. Using IAM policies and AWS Organizations ensures that access is controlled and the incident is contained without disrupting other parts of the infrastructure.