An investigator suspects a compromised EC2 instance on Amazon Web Services (AWS) was used for malicious activity.
To preserve evidence for a forensic investigation, what is the most appropriate initial step to both contain the threat and preserve the state of the virtual machine's storage?