When analyzing cloud findings for misconfigurations, which of the following would be considered a high-risk practice that should be flagged for remediation?
While editing the cloud security posture policy in Falcon to enhance compliance with industry standards, you notice a rule that detects misconfigured IAM roles in your AWS environment. What action should you configure for this rule to prevent unauthorized access effectively?