Through this exercise, we have taken the steps involved in generating and analyzing the Findings, thereby performing the corresponding Remediation process to solve the problem immediately.
| Finding | Scenario |
|---|---|
| UnauthorizedAccess:EC2/MaliciousIPCaller.Custom | Compromised EC2 Instance |
| Recon:IAMUser/MaliciousIPCaller.Custom | Compromised IAM credentials |
| UnauthorizedAccess:IAMUser/MaliciousIPCaller.Custom | Compromised IAM credentials |
| UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration | IAM Role credential exfiltration |