Questions tagged with Security

The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.

Content language: English

Select up to 5 tags to filter
Sort by most recent

Browse through the questions and answers listed below or filter and sort to narrow down your results.

My account was judged to be at risk of intrusion, when I received such a reminder email, I needed to upload it to my account to answer one to four questions, when I checked one by one and then changed...
1
answers
0
votes
20
views
profile picture
asked 9 hours ago
They don't stop to send pishing emails or try to access to my account, I got the servers of this domain are...
Accepted AnswerSecurity
2
answers
0
votes
32
views
Javier
asked a day ago
I have an application deployed on on-prem server, is there a way to use only IAM role or policy to access AWS SDk. I dont want to provide or store the secret key and access key anywhere to access it....
2
answers
0
votes
33
views
Braj
asked a day ago
Hello, In one of my company's AWS account we have vulnerable information leak issue. AWS Batch jobs were launched with ENV variables and this variables contains very important and vulnerable details....
Accepted AnswerAWS BatchSecurity
1
answers
0
votes
35
views
asked 2 days ago
I am working on an IoT solution in which IoT devices send data to AWS Kinesis streams. Each device is identified by an IoT Thing Name, and we use this name (or its hashed value) as the Kinesis...
1
answers
0
votes
21
views
Balu
asked 3 days ago
Hi Team, We want to import AWS data into Jira Service Management (JSM) assets [cloud]. We do have a plugin in Atlassian Marketplace with the name - "Assets - AWS Integration" but currently is...
0
answers
0
votes
14
views
asked 4 days ago
Hi, I have a rest API deployed on ECS and fronted with an ALB. I set a rule on WAF to block DDOS attack. If there are more than 10 request in one minute, then the requests should block. However, it...
1
answers
0
votes
51
views
profile picture
Efe
asked 4 days ago
2
answers
0
votes
46
views
asked 5 days ago
I have a web server which I do not want to expose to the entire internet. I know that legitimate requests to this server will come from {somewhere}.us-west-2.compute.amazonaws.com. How can I make a...
Accepted AnswerComputeSecurity
2
answers
0
votes
37
views
asked 5 days ago
Hi all I'm looking for some advice on to what extent Cognito's Custom Authentication (define-, create- and verify auth challenge lambdas) can integrate with 'Advanced Security' and adaptive...
0
answers
0
votes
22
views
reyes
asked 9 days ago
Hi AWS, I am installing vault server on Amazon Windows 11 platform. The steps I performed so far are: 1. Install vault executable zip. Unzipped it and store it inside location `C:\vault\vault.exe`. 2....
1
answers
0
votes
41
views
profile picture
asked 10 days ago
Has anyone here actually implemented this use case? It seems like it might just be a concept, so I'd love to hear detailed insights from anyone with practical...
1
answers
1
votes
45
views
asked 11 days ago