1 回答
- 最新
- 投票最多
- 评论最多
0
When AWS identifies compromised account credentials, the AWSCompromisedKeyQuarantineV2 AWS Managed Policy is applied to the IAM user with the compromised credentials. This blocks bad actors from performing various actions using that user.
You should ensure you are no longer using affected access keys and that they are disabled/deleted. The following guide explains steps to re-secure your account after potential compromise: https://aws.amazon.com/blogs/security/what-to-do-if-you-inadvertently-expose-an-aws-access-key/. I hope that helps!
已回答 1 年前
相关内容
- AWS 官方已更新 1 个月前