Help us improve the AWS re:Post Knowledge Center by sharing your feedback in a brief survey. Your input can influence how we create and update our content to better support your AWS journey.
Questions tagged with Network Security
Network and Application Protection services on AWS enable you to enforce fine-grained security policy at every network control point across your organization.
Content language: English
Filter questions
Select tags to filter
Sort by
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
151 results
Hello, I recently updated my google chrome browser to 124.0.6367.119 and found that my connections to AWS were being blocked. Right before I downloaded the update I was able to access the console. The...
0
answers
0
votes
382
views
asked 2 years ago
Hi,
I have API endpoints for writing the score of players after each game from the server. So my worry is, how can I make sure only the server is authorized to invoke the api? Is a resource policy i...
1
answers
0
votes
432
views
asked 2 years ago
I requested to reach concerto. A server is created for me. However, as you see in the uploaded photo , there is a login id and password. As I couldn't see any information about ID in the outputs sect...
2
answers
0
votes
458
views
asked 2 years ago
Today we found that on our RDS on every DB there is an extra table name "YOUR_DB_IS_HACKED" containing these below content. we checked that this table is created on on "2024-03-19".
> ('Your database...
2
answers
0
votes
634
views
asked 2 years ago
Hi there,
I’m looking at the egress traffic generated from my AWS account and I noticed several calls to all region ec2 endpoints. It seems to be a kind of health check, however I’m not sure. In parti...
1
answers
0
votes
463
views
asked 2 years ago
**How to prevent "awselb/2.0" server information exposure in HTTP response header?**

**Please provide a solution ...
3
answers
0
votes
4.4K
views
asked 2 years ago
I'm very new to AWS, so apologise if I am asking what might be a ridiculous question.
I am trying to understand more about security groups. Based of what I found from reading various documentations....
2
answers
0
votes
865
views
asked 2 years ago
Hello,
We have 2 different amazon accounts. First account has EKS (where application is hosted) and other has SQL DB. Does data between these 2 services flow on some AWS backbone network (like Azure)...
1
answers
0
votes
671
views
asked 2 years ago
This started happening a day or so ago. In a TCP/HTTPS request to `<bucket>.s3.us-west-2.amazonaws.com`, the <SYN,ACK> from S3 has a TSval of 0. Then the TSval in the subsequent message from S3 has a ...
1
answers
0
votes
864
views
asked 2 years ago
Hi,
I'm currently using an Ubuntu EC2 t2.large instance for specific needs. Before switching to AWS, I was using VMware without any issues. However, I've been experiencing some crashes with my EC2 in...
1
answers
0
votes
671
views
asked 2 years ago
So I have some service in AWS that wants to be protected from unauthorized access. If I have a proxy and only the proxy have access to call the backend service based on a resource policy, I am curious...
1
answers
0
votes
639
views
asked 2 years ago
Recently I have been worked on two-tier application deployment so I created two different docker containers and first is MySQL container and the rest is just a notepad project container so, I saw tha...
1
answers
0
votes
553
views
asked 2 years ago