Questions tagged with Security
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
Hi there,
Recently we published two posts on the AWS blog which were co-authored with AWS Solution Architects. This has been a fantastic experience and we believe that we can write more such...
1
answers
1
votes
299
views
asked 4 months agolg...
I'm encountering connectivity issues while deploying ECS services in bridge network mode within private subnets.
The architecture involves a mix of internal and external services, where awsvpc is...
0
answers
0
votes
245
views
asked 4 months agolg...
I have an EC2 Linux Debian server, where I perform some tasks through the PUTTY console, however, a few days ago I can no longer access the server using my credentials that I have always used.
1: I...
1
answers
0
votes
403
views
asked 5 months agolg...
A customer would like to install vs-code extensions to their EC2 (for example, the official GitHub Copilot extension). These extensions will be stored in the folder...
2
answers
0
votes
244
views
asked 5 months agolg...
We have gitlab-ee:16.3.1-ee.0 in our private ECR, which has a few [CVEs](https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/), including...
1
answers
0
votes
550
views
asked 5 months agolg...
Hello we currently run a third party intranet browser based app. The single server is in a data centre and access is a public facing IP address secured by a Netscaler enabling 2FA authentication...
2
answers
0
votes
295
views
asked 5 months agolg...
Hi!
Right now my frontend is storing the cognito generated access token to do request to my API endpoints and is working good. The thing is that I customized an attribute in Cognito containing the...
2
answers
0
votes
387
views
asked 5 months agolg...
Hello there,
I have some Public IPs connected to Nat Gateway mapped to private ip address.
NAC-ACL is created to block the ICMP but i notice the trace route to public ip is enable. May i...
1
answers
0
votes
218
views
asked 5 months agolg...
Good morning,
As recently, a vulnerability on Resource Manager has been exploited, we are worried and want to confirm with you about the impact....
2
answers
0
votes
244
views
asked 5 months agolg...
We have a number of AMIs that are used to create temporary Windows EC2 instances accessed via RDP in order to test our different versions of our products in different environments. Currently each AMI...
2
answers
0
votes
238
views
asked 5 months agolg...
S3 misconfigurationlg...
Hii , i was doing a security research for an organization , and one one endpoint i got this <Error>
<Code>SignatureDoesNotMatch</Code>
<Message>The request signature we calculated does not match the...
1
answers
0
votes
242
views
asked 5 months agolg...
I am fairly new to AWS and wanted to understand CORS behavior for various "AllowedOrigins" in the CORS policy.
1. If AllowedOrigin has wildcard (*) as a part or has an explicit origin mentioned...
0
answers
0
votes
88
views
asked 5 months agolg...