Capture Metadata , enable termination protection, Isolate (replace SG - no outbound traffic ) , disable ASG / ELB , snapshot EBS for deep analysis (offline ) create another EC2 (online)
Identify the bucket using GuardDuty
identify the source (e.g IAM role) and API using CloudTrail and Detective
(Block public access, Bucket Polices user Polices, VPC Endpoint, Pre-signed URL, S3 ACLs)
Identify the Cluster using GuardDuty
Isolate by Deny all ingress/egress traffic to the task using new Security Group
Identify the DB instance using GuardDuty
restrict network access (Security Groups & NACLs) , rotate passwords using Secrets Manager
Identify the User using GuardDuty
rotate password, invalidate using STS time condition by attaching an explicit Deny Policy to the User , check the CloudTrail logs
Disable & Rotate KMS Access Keys , IAM user credentials , EC2 Keys
Check the CloudTrail logs