1 Respuesta
- Más nuevo
- Más votos
- Más comentarios
0
When AWS identifies compromised account credentials, the AWSCompromisedKeyQuarantineV2 AWS Managed Policy is applied to the IAM user with the compromised credentials. This blocks bad actors from performing various actions using that user.
You should ensure you are no longer using affected access keys and that they are disabled/deleted. The following guide explains steps to re-secure your account after potential compromise: https://aws.amazon.com/blogs/security/what-to-do-if-you-inadvertently-expose-an-aws-access-key/. I hope that helps!
respondido hace un año
Contenido relevante
- OFICIAL DE AWSActualizada hace un año
- OFICIAL DE AWSActualizada hace 2 años