A development team is creating an open source toolset to manage a company's software as a service (SaaS) application. The company stores the code in a public repository so that anyone can view and download the toolset's code.
The company discovers that the code contains an IAM access key and secret key that provide access to internal resources in the company’s AWS environment
A security engineer must implement a solution to identify whether unauthorized usage of the exposed credentials has occurred. The solution also must prevent any additional usage of the exposed credentials.
Which combination of steps will meet these requirements? (Choose two.)
f3f9bfe
Highly Voted 6 months, 4 weeks ago7c84836
Most Recent 4 months, 2 weeks agolovekiller
1 month, 3 weeks agosema2232
5 months, 3 weeks agoaescudero51
5 months, 4 weeks agoZek
6 months, 3 weeks agodanish1234
6 months, 3 weeks ago