A company discovers a billing anomaly in its AWS account. A security consultant investigates the anomaly and discovers that an employee who left the company 30 days ago still has access to the account. The company has not monitored account activity in the past.
The security consultant needs to determine which resources have been deployed or reconfigured by the employee as quickly as possible.
Which solution will meet these requirements?
100fold
Highly Voted 11 months, 3 weeks agoFunkyFresco
Most Recent 1 month, 2 weeks agoRaphaello
7 months, 4 weeks agoawssecuritynewbie
8 months agoWeepingMaplte
9 months, 4 weeks agoDaniel76
10 months agoErnestokoro
10 months, 3 weeks agoAamee
10 months, 2 weeks ago