Questions tagged with Security
The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.
Content language: English
Filter questions
Select tags to filter
Sort by
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
1372 results
How can I design a secure architecture for a public-facing API on AWS when the application interacts with multiple backend services (databases, event-driven components, and external APIs) while ensuri...
Accepted AnswerSecurity
1
answers
0
votes
19
views
asked a day ago
What’s the recommended way to test whether my Bedrock application is resistant to prompt injection and jailbreaks before going to production?
1
answers
0
votes
13
views
asked a day ago
I am trying Inspector Code Security
Connected a GitHub repo with several projects. Those projects show up in the Code Security repository list.
I selected each and clicked on 'On-demand Scan'. A mess...
Accepted AnswerSecurity
3
answers
0
votes
15
views
asked 3 days ago
Greetings all,
When working on complex network ACL, we sometimes have to enter IP Addresses - Looking back at the network ACL months later, I can't figure out who owns the IP Address what what is it...
1
answers
1
votes
32
views
asked 4 days ago
Hi All,
I have just started to learn VPC on AWS. I have a scenario where I launched two private and one public subnets. My expectation is that private instances should connect to internet via NAT gat...
1
answers
0
votes
30
views
asked 4 days ago
Hello everyone,
I’m looking for advice on secure, scalable, and seamless API authorization best practices across multiple cloud platforms.
Here’s the setup:
I have an API Gateway deployed in AWS, pro...
1
answers
0
votes
45
views
asked 5 days ago
My question is I'm having issues these particular place called key pair after creating it successful when I want to install it then it's will showing not installed and I have tried several times think...
1
answers
0
votes
32
views
asked 6 days ago
Good morning everyone;
I created a VPN with two subnets, a private one with an EC2 instance (protected by Security Group) and a public one with a NAT GTW and IGW. In the private subnet, in the NACL s...
2
answers
0
votes
79
views
asked 17 days ago
What is the best tool to identify resources an IAM role has access to but doesn't use/ need.
I attempted using Last accessed/ CloudTrail lake / Cloudtrail API
But none of these worked for various ...
1
answers
0
votes
50
views
asked 22 days ago
Two days ago we stopped receiving notifications from our Gravity Forms contact form on WordPress. We've confirmed with Gravity that the notifications are being handed over the mail server successfully...
1
answers
-1
votes
51
views
asked 23 days ago
Hi ,
UK has published https://www.ncsc.gov.uk/collection/cloud/the-cloud-security-principles
I want to understand how doe AWS comply to these principles.AWS offers lot of operational guidance on ho...
1
answers
-1
votes
85
views
asked 24 days ago
For ARM64 workloads in Nitro Enclaves, what are the recommended compiler flags?
Specifically:
1. Should we use -mcpu=neoverse-n1 (conservative) or -mcpu=neoverse-v1
(Graviton3-specific) or -mcpu=...
1
answers
0
votes
29
views
asked a month ago