Overview
Restricting access reduces the risk of unauthorized changes.
Recommended Actions
-
Enable Two-Factor Authentication
-
Use IP restrictions if available
-
Remove unused users or access keys
Restricting access reduces the risk of unauthorized changes.
Enable Two-Factor Authentication
Use IP restrictions if available
Remove unused users or access keys