FUNDAMENTALS OF COMPUTER

DATABASE FUNDAMENTALS

CLOUD COMPUTING AND DATABASES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What should you do if you believe your AWS account has been compromised? (Select all that apply)
A
Delete any resources in your account that you did not create.
B
Respond to any notifications you received from AWS through the AWS Support Center.
C
Change all IAM user’s passwords.
D
Delete or rotate all programatic (API) access key
Explanation: 

Detailed explanation-1: -If you suspect that AWS resources are used for abusive purposes, contact the AWS Trust & Safety team using the Report Amazon AWS abuse form, or by contacting abuseamazonaws.com. Provide all the necessary information, including logs in plaintext, email headers, and so on, when you submit your request.

Detailed explanation-2: -Activate MFA Activating MFA can help secure the accounts and prevent unauthorized users from logging in to accounts without a security token. For increased security, it’s a best practice to configure MFA to help protect your AWS resources. You can activate a virtual MFA for IAM users and the AWS account root user.

Detailed explanation-3: -To protect against this, it’s important to use a strong and unique password for each AWS account. Additionally, you should also use two-factor authentication (2FA) to help protect your account from unauthorized access. Another way that hackers can gain access to an AWS account is through misconfigured security groups.

There is 1 question to complete.