1 Answer
- Newest
- Most votes
- Most comments
0
When AWS identifies compromised account credentials, the AWSCompromisedKeyQuarantineV2 AWS Managed Policy is applied to the IAM user with the compromised credentials. This blocks bad actors from performing various actions using that user.
You should ensure you are no longer using affected access keys and that they are disabled/deleted. The following guide explains steps to re-secure your account after potential compromise: https://aws.amazon.com/blogs/security/what-to-do-if-you-inadvertently-expose-an-aws-access-key/. I hope that helps!
answered a year ago
Relevant content
- Accepted Answer
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 6 months ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 8 months ago