1 Risposta
- Più recenti
- Maggior numero di voti
- Maggior numero di commenti
0
When AWS identifies compromised account credentials, the AWSCompromisedKeyQuarantineV2 AWS Managed Policy is applied to the IAM user with the compromised credentials. This blocks bad actors from performing various actions using that user.
You should ensure you are no longer using affected access keys and that they are disabled/deleted. The following guide explains steps to re-secure your account after potential compromise: https://aws.amazon.com/blogs/security/what-to-do-if-you-inadvertently-expose-an-aws-access-key/. I hope that helps!
con risposta un anno fa
Contenuto pertinente
- AWS UFFICIALEAggiornata 2 anni fa
- AWS UFFICIALEAggiornata 2 anni fa
- AWS UFFICIALEAggiornata 2 anni fa