All Content tagged with Security

The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.

Content language: English

Select up to 5 tags to filter
Sort by most recent
I want to migrate my Cognito user pool from one AWS account to another for some business related reasons. However for migration I saw that the following url lists the approaches to do the migration...
Accepted AnswerAmazon CognitoSecurity
1
answers
0
votes
286
views
Srushti
asked a month ago
Hi, IHAC that is looking for the encryption options for EBS volumes and wants to correlate with the options they used on other cloud platform as: There are 3 options e when encrypting the disks of a...
1
answers
0
votes
302
views
AWS
asked a month ago
I have created a WebACL and added some rule groups in count mode. Before turning rule actions to Block (or Challenge/Captcha) I would like to evaluate potential impact on my web application. With AWS...
1
answers
0
votes
394
views
AWS
Piotrek
asked a month ago
I am setting up an Amazon GuardDuty and I am interested in the VPC Traffic Flow Logs collected and sent to GuardDuty. Can I customize this Traffic? For example, in my Account there are 5 VPCs and I...
1
answers
0
votes
510
views
LinhCN
asked a month ago
My goal is to have a request sent from a lambda with a static IP address. This is the current setup i have. ![Enter image description here](/media/postImages/original/IMi-2u2_boTMC9fYhVo7QeoQ) I...
3
answers
0
votes
576
views
serp
asked a month ago
I'm in the process of setting up the AWS Secret Manager for application access. The part I'm stuck on is the authentication from the application to the Secret Manager. This appears to be restricted to...
2
answers
0
votes
261
views
Nathon
asked a month ago
Hello We would like to constrain VPC Peering to stay within an OU. We created the following SCP: ``` { "Version": "2012-10-17", "Statement": [ { "Sid": "RestrictVPCPeering", ...
1
answers
0
votes
251
views
Nicki
asked a month ago
Hi! I have my whole app deployed in AWS and I'm using a lot of different services, for starters Im using cognito with oauth2 to generate the tokens and store the user sensible data. does this mean...
1
answers
0
votes
454
views
cao95
asked a month ago
Hi all, What are you all using for network/content filtering for outbound traffic to the internet from your EC2 instances? We use Meraki network equipment for our local networks which simplifies the...
1
answers
0
votes
1106
views
asked 2 months ago
Hello, how can I access pods running in an AWS EKS cluster for vulnerabilities? What are the options and best practices here? We already use AWS Inspector for AWS Lambda and AWS EC2. However, no...
2
answers
0
votes
587
views
asked 2 months ago
For reference, I used this guide on sharing my Private CA, which leverages AWS Resource Access Manager (RAM): https://repost.aws/knowledge-center/acm-share-pca-with-another-account I have...
1
answers
0
votes
526
views
asked 2 months ago
When I launch my platform with myanmar network, the connecting server alert was showed. My server is from AWS. I would like to ask if there is any problem with myanmar network now or not.
1
answers
0
votes
475
views
Meta
asked 2 months ago