Skip to content

Articles tagged with Security, Identity, & Compliance

Secure your workloads and applications in the cloud

Content language: English

Filter articles
Select tags to filter
Sort by
Sort by most recent

Browse through articles or filter your results using the tools displayed.

23 results
AWS
SubuEXPERT
published 19 days ago0 votes85 views
If a user access key is acquired by a bad actor, we can use this standard operating procedure to safely make the lost access key ineffective
Managing database compliance across multiple AWS accounts is time-consuming and error-prone. This article shows you how to use AWS Config Organization Conformance Packs to automate compliance monitori...
A practical guide to implementing security contact automation using CloudFormation StackSets
A guide to understanding the risks and response when EC2 Instance IDs become public
AWS
published 3 months ago0 votes242 views
A guide to understanding the risks and response when AWS Account IDs become public
This article explores key proactive benefits and offerings within AWS Enterprise Support and provides a clear understanding of how to maximize benefits and navigate challenges.
Implement secure machine-to-machine authentication with differentiated access permissions using Amazon Cognito and API Gateway.
Optimizing authentication costs when third-party partners can't implement token caching best practices
Security teams can use IAM Access Analyzer to inventory who has access to their organization's critical resources
You can now troubleshoot RDS IAM DB authentication issues at your end using these metrics and logs
AWS
published 10 months ago2 votes387 views
As legal hold has no expiration date, users may wish to use this mode to apply an indefinite lock on objects they wish to protect from accidental or malicious deletion. In this scenario, it may be des...
  • 1
  • 2
  • Page size
    12 / page