Incident response
Even with mature preventive and detective controls in place, your organization should still put processes in place to respond to and mitigate security incidents. Logging, event processing, clean rooms, and game days are effective techniques to help you protect your content within your workload, but many organizations continue to protect content rights after delivery. In media applications where you are designing system to carry high value, copyrighted material, you should have a response plan that also includes illegal re-distribution of your content and intellectual property.
License holders and distributors often work with a third-party forensic security firm to embed and trace watermarks to the point of origin on a newsgroup, torrent, or piracy website. The report furnished can often be used to take legal action, which might include, but is not limited to, DMCA takedowns and monetary fines.
It is against the
AWS Acceptable
Use Policy