6.1 Respond to IAM Role credential exfiltration
6.2 Respond to a compromised S3 Bucket
6.3 Respond to compromised IAM credentials
6.4 Respond to a Lambda function calling malicious IP
6.5 Respond to Malware on Amazon Elastic Block Store
6.6 Respond to a compromised EC2 instance