During a security incident, you need to capture relevant forensics data from a compromised resource. Describe the steps you would take using Amazon EBS volume snapshots and memory dumps, and how you would ensure the integrity of this data using AWS services.