A company discovers a billing anomaly in its AWS account. A security consultant investigates the anomaly and discovers that an employee who left the company 30 days ago still has access to the account. The company has not monitored account activity in the past.
The security consultant needs to determine which resources have been deployed or reconfigured by the employee as quickly as possible.
Which solution will meet these requirements?
100fold
Highly Voted 1 year, 1 month agoFunkyFresco
Most Recent 3 months, 2 weeks agoRaphaello
9 months, 4 weeks agoawssecuritynewbie
10 months agoWeepingMaplte
11 months, 4 weeks agoDaniel76
1 year agoErnestokoro
1 year agoAamee
1 year ago