Scenario: An AEM administrator receives reports of unauthorized access to the AEM authoring environment. What steps should they take to investigate and mitigate this security incident?

  • Ignore the reports, as they might be false alarms
  • Notify users about the incident and ask them to change their passwords
  • Review access logs, identify the source of unauthorized access, revoke access credentials, and implement additional security measures
  • Shut down the AEM environment temporarily until the issue is resolved
Upon receiving reports of unauthorized access, the AEM administrator should promptly review access logs, identify the source of unauthorized access, revoke access credentials of compromised accounts, and implement additional security measures to prevent further unauthorized access.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *