Questions tagged with Security
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
The current environment has also built both ECSCluster Fargate and Container types with Fargate.
To improve container security, we would like to create a user other than Root privileges and run the...
1
answers
0
votes
235
views
asked 8 months agolg...
Hello.
I am implementing Controls (guardrails) with Control Tower. Per example I have enabled "Disallow Actions as a Root User" in ine OU, so when I try to do something with root user, it is no...
1
answers
0
votes
390
views
asked 8 months agolg...
I need to add multiple rules to a new security group, around 130 rules to be specific, spread across 7 port ranges. These rules are already in IP ranges and ports are in ranges too, hence I cannot use...
2
answers
0
votes
956
views
asked 8 months agolg...
IP address unique?lg...
Hi,
Apologies in advance for what is a really basic question.
Our website is hosted in AWS, but I've been asked to confirm whether our website IP address is solely assigned to our website, and...
2
answers
0
votes
241
views
asked 8 months agolg...
### The direction of access control I want is as follows.
1. Make certain users accessible only to certain DBs
2. Can see what privileges a particular user has on a particular DB (Select, insert,...
2
answers
0
votes
199
views
asked 8 months agolg...
I have created a new OpenSearch collection with network access Policy as Public and created a data access policy with an IAM user. Using this IAM user, I am able to create/access/query indices from...
0
answers
0
votes
78
views
asked 8 months agolg...
Hi AWS Community,
Recently, I encountered a distressing issue with AWS Support. My AWS account was placed under verification, and during this period, all my access and privileges were revoked until I...
0
answers
0
votes
91
views
asked 8 months agolg...
I would like to monitor the volume of data sent externally from my AWS account.
I'm looking for to retrieve logs that allow me to have the volume of data sent externally in real time.
Who can help me...
1
answers
0
votes
384
views
asked 8 months agolg...
I've configured a VPN endpoint with Federated authentication using Azure as the SAML provider. However, I'm facing an issue with the Authorization rules. When I choose "Allow access to users in a...
1
answers
0
votes
331
views
asked 8 months agolg...
I’m currently working on an app using AWS Amplify, and I’ve got a set of APIs that I want to enhance security measures. I’m wondering if there’s a practical way to achieve this through the CLI, or in...
1
answers
0
votes
194
views
asked 8 months agolg...
I'm trying to connect to a SQL Server 2019 instance (happens to be in an EC2) from a C# .NET AWS lambda. I'm using a self-signed certificate to establish client trust with the SQL instance.
There...
1
answers
0
votes
979
views
asked 8 months agolg...
Hi community,
We have a web-based application running in standard n-tier architecture (EC2 instance web server, EC2 instance DB server, application/network load balancers etc) with authentication...
1
answers
0
votes
282
views
asked 8 months agolg...