Questions tagged with Security
The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
Hi!
I need to do some stress test to my APP that is deployed in my AWS Infrastructure.
I need to test in one month traffic:
1. How many users I can have in paralel at the same time
2. How many...
Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only.
In my development environment, which is also used for early user testing to get feedback, I am using...
Hi, [Validating Admission Policy](https://kubernetes.io/docs/reference/access-authn-authz/validating-admission-policy/) has been in GA state since v1.30. Is there any reason why it is not available in...
Hello, is there a solution similar to an automated Nmap scan to be alerted when a change in the perimeter has happened? For example, a new listener.
Thanks
I'm loggin in the aws cli like this:
`aws sso login --profile val-profile-name`
after getting the message:
Successfully logged into Start URL: `https://....`
but after this any call to aws like for...
Hello Everyone -
I ran into this situation where I advised someone not to use Default VPC for Prod purposes, but they went ahead and created resources on the Default VPC anyway. Now, all of the...
This blog post "https://aws.amazon.com/blogs/apn/how-helecloud-used-aws-secrets-manager-to-automate-credentials-rotation-of-ms-sql-on-amazon-ec2/" describes a solution for automating credential...
Hello,
I use an EC2 instance where some inportant and sensitive data are located. My clients are really concern about how these data are secured, and they frequently ask me to justify myself on this...
There are some unimportant accounts that we want to disable config recordings on to minimize costs, so we were planning on adding exceptions to the mandatory control for config so that we can disable...
Good morning, I am a student at the Federal Technological University of Paraná (UTFPR) and I created a tool that aims to recommend controls from the AWS Well-Architected Security Pillar based on user...
Hi all,
I would like to hear your approaches when applying a rate-based rule via AWS WAF.
What are the best ways to permanently block IP addresses that trigger the RBR? I would also like to send...
I wanted to put this pout there since i know a lot of people might struggle with this
but when you use quick setup and initiate conformance packs in yoru org and decide they are causing more harm...