A company maintains an open-source application that is hosted on a public GitHub repository.
While creating a new commit to the repository, an engineer uploaded their IAM access key and secret access key. The engineer reported the mistake to a manager, and the manager immediately disabled the access key.
The company needs to assess the impact of the exposed access key. A security engineer must recommend a solution that requires the least possible managerial overhead.
Which solution meets these requirements?
- Analyze an IAM Identity and Access Management (IAM) use report from IAM Trusted Advisor to see when the access key was last used.
- Analyze Amazon CloudWatch Logs for activity by searching for the access key.
- Analyze VPC flow logs for activity by searching for the access key.
- Analyze a credential report in IAM Identity and Access Management (IAM) to see when the access key was last used.
Answer(s): A
Explanation:
To assess the impact of the exposed access key, the security engineer should recommend the following solution:
Analyze an IAM use report from AWS Trusted Advisor to see when the access key was last used. This allows the security engineer to use a tool that provides information about IAM entities and credentials in their account, and check if there was any unauthorized activity with the exposed access key.
Reveal Solution Next Question