All Content tagged with Security
The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.
Content language: English
Select up to 5 tags to filter
Sort by most recent
I want to migrate my Cognito user pool from one AWS account to another for some business related reasons. However for migration I saw that the following url lists the approaches to do the migration...
Hi,
IHAC that is looking for the encryption options for EBS volumes and wants to correlate with the options they used on other cloud platform as:
There are 3 options e when encrypting the disks of a...
I have created a WebACL and added some rule groups in count mode. Before turning rule actions to Block (or Challenge/Captcha) I would like to evaluate potential impact on my web application. With AWS...
I am setting up an Amazon GuardDuty and I am interested in the VPC Traffic Flow Logs collected and sent to GuardDuty. Can I customize this Traffic? For example, in my Account there are 5 VPCs and I...
My goal is to have a request sent from a lambda with a static IP address. This is the current setup i have.
![Enter image description here](/media/postImages/original/IMi-2u2_boTMC9fYhVo7QeoQ)
I...
I'm in the process of setting up the AWS Secret Manager for application access. The part I'm stuck on is the authentication from the application to the Secret Manager. This appears to be restricted to...
Hello
We would like to constrain VPC Peering to stay within an OU.
We created the following SCP:
```
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "RestrictVPCPeering",
...
Hi!
I have my whole app deployed in AWS and I'm using a lot of different services, for starters Im using cognito with oauth2 to generate the tokens and store the user sensible data. does this mean...
Hi all,
What are you all using for network/content filtering for outbound traffic to the internet from your EC2 instances? We use Meraki network equipment for our local networks which simplifies the...
Hello,
how can I access pods running in an AWS EKS cluster for vulnerabilities? What are the options and best practices here?
We already use AWS Inspector for AWS Lambda and AWS EC2. However, no...
For reference, I used this guide on sharing my Private CA, which leverages AWS Resource Access Manager (RAM): https://repost.aws/knowledge-center/acm-share-pca-with-another-account
I have...
When I launch my platform with myanmar network, the connecting server alert was showed. My server is from AWS. I would like to ask if there is any problem with myanmar network now or not.