Skip to content

All Content tagged with Security

The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.

Content language: English

Filter content
Select tags to filter
Sort by
Sort by most recent
1419 results
So most of the topology is like following when we have a fleet of Firewalls behind gwlb: Traffic A to B: A -> GWLBE -> GWLB -> FW(with Geneve decapsulation/encapsulation) -> GWLBE -> B Response B to A...
1
answers
0
votes
10
views
asked 13 hours ago
I have enabled Cognito App Client to have refresh token rotation. Using the js sdk, I am able to make requests to rotate tokens by using current refresh token and command `GetTokensFromRefreshTokenCom...
Accepted AnswerSecurityAmazon Cognito
2
answers
0
votes
36
views
asked a day ago
How can I design a secure architecture for a public-facing API on AWS when the application interacts with multiple backend services (databases, event-driven components, and external APIs) while ensuri...
Accepted AnswerSecurity
1
answers
0
votes
36
views
asked 8 days ago
What’s the recommended way to test whether my Bedrock application is resistant to prompt injection and jailbreaks before going to production?
Accepted AnswerAmazon BedrockSecurity
1
answers
0
votes
30
views
asked 8 days ago
For Security Leaders and IT Executives to demonstrate quick value while building toward long-term strategic goals.
I am trying Inspector Code Security Connected a GitHub repo with several projects. Those projects show up in the Code Security repository list. I selected each and clicked on 'On-demand Scan'. A mess...
Accepted AnswerSecurity
3
answers
0
votes
26
views
asked 10 days ago
Greetings all, When working on complex network ACL, we sometimes have to enter IP Addresses - Looking back at the network ACL months later, I can't figure out who owns the IP Address what what is it...
1
answers
1
votes
36
views
asked 11 days ago
Hi All, I have just started to learn VPC on AWS. I have a scenario where I launched two private and one public subnets. My expectation is that private instances should connect to internet via NAT gat...
2
answers
0
votes
40
views
asked 11 days ago
For platform engineers and security architects looking to embed automated security controls into development workflows.
Hello everyone, I’m looking for advice on secure, scalable, and seamless API authorization best practices across multiple cloud platforms. Here’s the setup: I have an API Gateway deployed in AWS, pro...
1
answers
0
votes
55
views
asked 12 days ago
My question is I'm having issues these particular place called key pair after creating it successful when I want to install it then it's will showing not installed and I have tried several times think...
1
answers
0
votes
38
views
asked 12 days ago
Good morning everyone; I created a VPN with two subnets, a private one with an EC2 instance (protected by Security Group) and a public one with a NAT GTW and IGW. In the private subnet, in the NACL s...
2
answers
0
votes
99
views
asked 24 days ago
  • 1
  • 2
  • 3
  • 4
  • 5
  • •••
  • 119
  • Page size
    12 / page