In a scenario where you need to quickly isolate and secure compromised AWS resources, what strategies would you employ using AWS IAM and AWS Organizations? Provide a detailed step-by-step approach. | AWS Certified Security - Specialty Quiz - LeetQuiz