Email from AWS about an abuse of its usage policy

0

I received the following message: "You have been engaged in activity that resembles attempts to access remote hosts on the Internet without authorization. Activity of this nature is prohibited in the AWS Acceptable Use Policy"

I would like to know how to solve this problem

pablo
preguntada hace 8 meses205 visualizaciones
3 Respuestas
1
Respuesta aceptada

could you please accept the answer?

profile picture
EXPERTO
respondido hace 8 meses
profile picture
EXPERTO
revisado hace 4 horas
1

Hello pablo. Receiving a message like the one you mentioned indicates that there may have been suspicious or unauthorized activity originating from your AWS (Amazon Web Services) account. AWS takes security seriously, and such notifications are typically generated to protect the integrity of their services and the security of their customers. To resolve this issue, you should follow these steps:

Check for Unauthorized Access: Review your AWS account activity to ensure that there hasn't been any unauthorized access or suspicious actions. You can do this by checking the AWS CloudTrail logs, AWS CloudWatch Logs, or any other relevant logs and monitoring tools that you have set up in your AWS environment.

Verify the Activity: If you find any unusual or unauthorized activity, take note of the specific instances, IP addresses, or resources involved.

Secure Your Account: Change your AWS account password immediately, and enable Multi-Factor Authentication (MFA) to enhance the security of your account.

Identify the Cause: Investigate the root cause of the unauthorized activity. It could be due to a compromised AWS Access Key, an insecure application, or a misconfigured AWS resource. Look for any vulnerabilities and address them.

Remove Unauthorized Access: If you identify any unauthorized users or access keys, revoke their access immediately. Disable or delete any compromised resources if necessary.

Regularly Monitor and Audit: Continue to monitor and audit your AWS environment regularly to detect and respond to any security threats or suspicious activities promptly.

Best regards, Andrii

profile picture
EXPERTO
respondido hace 8 meses
0

Ok, we have verified and we have solved the problem, what do you have to do now?

pablo
respondido hace 8 meses

No has iniciado sesión. Iniciar sesión para publicar una respuesta.

Una buena respuesta responde claramente a la pregunta, proporciona comentarios constructivos y fomenta el crecimiento profesional en la persona que hace la pregunta.

Pautas para responder preguntas