Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
In a scenario where you need to quickly isolate and secure compromised AWS resources, what strategies would you employ using AWS IAM and AWS Organizations? Provide a detailed step-by-step approach.
A
Immediately delete all IAM users and recreate them with new credentials.
B
Rotate the access keys and passwords of affected IAM users using AWS Secrets Manager, and invalidate old credentials by revoking their permissions in IAM.
C
Disable the AWS account and create a new one, transferring all resources to the new account.
D
Change the root account password and ignore the IAM users assuming they are not compromised.