Questions tagged with Security, Identity, & Compliance
Secure your workloads and applications in the cloud
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
Hi,
We have created an App with a phone call feature and the US Users need to register their phone number before using it. To provide security to our app, and to avoid any phone number registration...
I'm digging into some corners of IAM conditions that I don't use a lot, and I've been testing some sample policies to make sure real-world behavior matches my assumptions.
I've created a role with...
My account was judged to be at risk of intrusion, when I received such a reminder email, I needed to upload it to my account to answer one to four questions, when I checked one by one and then changed...
I have an application deployed on on-prem server, is there a way to use only IAM role or policy to access AWS SDk. I dont want to provide or store the secret key and access key anywhere to access it....
Hey, It's beem 4 days I was working on a project in AWS I am practicing, but the problem is at the last moment when was about to complete it, whenever I request anything or run anything it gives me...
I have two AWS accounts: Account A and Account B. IAM users from Account B typically access resources in Account A by assuming a role via IAM.
We are now planning to set up QuickSight dashboards in...
Hi Team,
We want to import AWS data into Jira Service Management (JSM) assets [cloud]. We do have a plugin in Atlassian Marketplace with the name - "Assets - AWS Integration" but currently is...
Hello guys,
"How can I report a loophole I’ve discovered in AWS?"
Hi everyone,
I understand that CloudTrail is mainly used to monitor activities within my AWS account, and I can ingest custom events into CloudTrail.
My plan is to ingest events from my custom...
Dear Forum Users,
Can anyone guide me why my SSL renewal process is not going ahead, I have added the proper records under CNAME under ACM section, and based on below DNS Chcker, it keeps showing...
We're in the process of using AWS Config and found two similar rules related to MFA:
-...
I configured my AWS Elastic BeanStalk single instance to use the HTTPS protocol for my custom domain attached to it, using the official documentation provided by AWS for the JAVA SE platform...