Help us improve the AWS re:Post Knowledge Center by sharing your feedback in a brief survey. Your input can influence how we create and update our content to better support your AWS journey.
All Content tagged with Security
The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.
Content language: English
Filter content
Select tags to filter
Sort by
Sort by most recent
1454 results

I am trying to build a dashboard within Quick Suite using cross function datasets. I seem to be the only one withi...
1
answers
0
votes
19
views
asked 5 days ago

AWS OFFICIALUpdated 6 days ago0 votes44 views
This article shows you how to identify and secure open proxies in your AWS environment to prevent abuse, protect your IP address reputation, and control costs.
Hello,
We recently experienced service instability due to automatic security patches being applied to our Amazon MSK cluster during peak business hours (approx. 10:00 AM local time). These updates tr...
3
answers
0
votes
23
views
asked 6 days ago
My account looks completely reset after changing password. I don't see services I use, though they seem to work. The account id also changed.
1
answers
-1
votes
35
views
asked 8 days ago
How i can resolve accessing aws web service in my internal network?
2
answers
0
votes
35
views
asked 10 days ago
We’re using Gateway Load Balancer (GWLB) to insert third-party firewalls into our traffic path using GENEVE tunnelling.
One thing we’re unclear on: when traffic is forwarded through GWLB to the firew...
2
answers
0
votes
49
views
asked 12 days ago
We have an interface VPCendpoint for an AWS service and attached a security group to it. Does the security group control traffic to the endpoint, or just the traffic from the endpoint to the service ?
2
answers
0
votes
45
views
asked 12 days ago
Hi!
If a client uses my app to collect data and the data is stored in my database who is the owner of the data?
I saw that with legal agreements you can define if for example my company stores the da...
1
answers
0
votes
43
views
asked 12 days ago
Hi.
We have recently migrated from AWS Inspector Classic to AWS Inspector V2 which provides CIS scans for our EC2 fleet.
We successfully configured everything and have scans running on several AL2-b...
3
answers
0
votes
80
views
asked 12 days ago
Hi,
I want to run my own hypervisor (KVM/QEMU) on an EC2 bare metal instance and launch a guest VM that uses AMD SEV (not the EC2 managed SEV-SNP “Confidential VM” mode).
Goal:
Host: EC2 m6a.metal ...
1
answers
0
votes
33
views
asked 13 days ago
I'm using a CloudFront distribution with a Lambda@Edge function as a secure proxy for a Cognito User Pool. The purpose of the function is to intercept outbound POST requests to Cognito, inject a Secre...
1
answers
0
votes
73
views
asked 16 days ago
Amazon resource identifier: arn:aws:ec2:eu-north-1:618951595864:instance/***********
Remote IP/Ports:
************ 9068 Protocol: UDP
Total Gbits sent: 209.250951216
Total packets sent: 22204048
Tot...
2
answers
-2
votes
59
views
asked 18 days ago