DATABASE FUNDAMENTALS
CLOUD COMPUTING AND DATABASES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Delete any resources in your account that you did not create.
|
|
Respond to any notifications you received from AWS through the AWS Support Center.
|
|
Change all IAM user’s passwords.
|
|
Delete or rotate all programatic (API) access key
|
Detailed explanation-1: -If you suspect that AWS resources are used for abusive purposes, contact the AWS Trust & Safety team using the Report Amazon AWS abuse form, or by contacting abuseamazonaws.com. Provide all the necessary information, including logs in plaintext, email headers, and so on, when you submit your request.
Detailed explanation-2: -Activate MFA Activating MFA can help secure the accounts and prevent unauthorized users from logging in to accounts without a security token. For increased security, it’s a best practice to configure MFA to help protect your AWS resources. You can activate a virtual MFA for IAM users and the AWS account root user.
Detailed explanation-3: -To protect against this, it’s important to use a strong and unique password for each AWS account. Additionally, you should also use two-factor authentication (2FA) to help protect your account from unauthorized access. Another way that hackers can gain access to an AWS account is through misconfigured security groups.