An investigator suspects a compromised EC2 instance on Amazon Web Services (AWS) was used for malicious activity. To preserve evidence for a forensic investigation, what is the most appropriate initial step to both contain the threat and preserve the state of the virtual machine's storage?
-
A
Terminate the instance immediately to halt all malicious processes.
-
B
Isolate the instance using a restrictive security group and create a snapshot of its EBS volume.
-
C
Log into the instance via SSH and create a tarball of the entire file system.
-
D
Submit a support ticket to AWS requesting a full physical disk image of the host server.