Imagine you have detected a compromised Amazon EC2 instance. Describe the process you would follow to isolate this instance using AWS services, ensuring minimal impact on other resources and maintaining the integrity of forensic data. | AWS Certified Security - Specialty Quiz - LeetQuiz