A company maintains an open-source application that is hosted on a public GitHub repository. While creating a new commit to the repository, an engineer uploaded their AWS access key and secret access key. The engineer reported the mistake to a manager, and the manager immediately disabled the access key.
The company needs to assess the impact of the exposed access key. A security engineer must recommend a solution that requires the least possible managerial overhead.
Which solution meets these requirements?
- Analyze an AWS Identity and Access Management (IAM) use report from AWS Trusted Advisor to see when the access key was last used.
- Analyze Amazon CloudWatch Logs for activity by searching for the access key.
- Analyze VPC flow logs for activity by searching for the access key.
- Analyze a credential report in AWS Identity and Access Management (IAM) to see when the access key was last used.
Reveal Solution Next Question