
Answer-first summary for fast verification
Answer: Rotate the access keys and passwords of affected IAM users using AWS Secrets Manager, and invalidate old credentials by revoking their permissions in IAM.
Option B is the correct approach as it involves specific actions to secure the account without causing unnecessary downtime or data loss. Rotating credentials and revoking permissions are standard practices to mitigate the risk of further unauthorized access.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
In a scenario where you need to quickly isolate and secure compromised AWS resources, what strategies would you employ using AWS IAM and AWS Organizations? Provide a detailed step-by-step approach.
A
Immediately delete all IAM users and recreate them with new credentials.
B
Rotate the access keys and passwords of affected IAM users using AWS Secrets Manager, and invalidate old credentials by revoking their permissions in IAM.
C
Disable the AWS account and create a new one, transferring all resources to the new account.
D
Change the root account password and ignore the IAM users assuming they are not compromised.
No comments yet.