During a scheduled review, the security team discovers that privileged credentials may have been shared in a publicly accessible repository. Which measure best addresses this issue?
Shift all virtual instances to a different data center to avoid downtime
Remove old local accounts on internal systems and delete unneeded application logs
Reissue the compromised credentials and begin a process to investigate potential unauthorized entries
Redirect external connections through an isolated network segment to limit access
Rotating credentials and starting an incident procedure reduces the chance of further intrusions. Analyzing system logs gives insight into whether attackers have already used the shared credentials. Other measures might be beneficial but do not directly address the compromised accounts, which is crucial in this case.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is credential rotation important after a compromise?
Open an interactive chat with Bash
What should be analyzed in system logs during an investigation?
Open an interactive chat with Bash
How do public repositories pose a risk to credentials?