A. Delete the IAM user’s access key Immediately. Create a new access key to update in the legacy application.
B. Create a new access key for the IAM user. Update the latest application version to use the new access key. Deactivate the compromised access key.
C. Attach an IAM policy to revoke all sessions from before the time of the AWS Abuse notification.
D. Update the legacy application to use an IAM role that has the same permissions as the IAM user.

- Awsexamhub website is not related to, affiliated with, endorsed or authorized by Amazon.
- Trademarks, certification & product names are used for reference only and belong to Amazon.