A company notices suspicious network activity against an application that is running on a fleet of Amazon EC2 instances. The suspicious activity is coming from a single IP address.
Which AWS service should the company use to block access from this IP address?
Submit