Questions tagged with Security

The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.

Content language: English

Select up to 5 tags to filter
Sort by most recent

Browse through the questions and answers listed below or filter and sort to narrow down your results.

Is there a way to hide sensitive runtime properties in AWS Managed Apache Flink (Amazon Kinesis Data Analytics)? They are currently displayed in plain text in the AWS console. Flink supposedly...
1
answers
0
votes
40
views
kt_kt
asked 9 days ago
Hello I am using free tier AWS EC2 Ubuntu instance which stops responding everyday there are no issue with status checks and instance shows running. i am unable to access my ssh terminal & websites...
3
answers
0
votes
39
views
codelab
asked 9 days ago
What are the steps to reopen my account
1
answers
0
votes
26
views
Ayomi
asked 11 days ago
In looking [here](https://docs.aws.amazon.com/AmazonS3/latest/userguide/MultiFactorAuthenticationDelete.html) regarding enabling MFA deletion on an S3 bucket, and checking the [AWS CLI v2...
1
answers
0
votes
31
views
asked 11 days ago
Hello, my developer sent me this as my online portal is not working. “I could see port 80, 443 are blocked in my server. As part of the improvement, the server closed with all unwanted ports which...
1
answers
0
votes
44
views
Yao
asked 11 days ago
Is there a way to check the log where the user changed the action of the rule for WebAcl?
1
answers
0
votes
31
views
nice
asked 11 days ago
My account was judged to be at risk of intrusion, when I received such a reminder email, I needed to upload it to my account to answer one to four questions, when I checked one by one and then changed...
1
answers
0
votes
49
views
profile picture
asked 13 days ago
They don't stop to send pishing emails or try to access to my account, I got the servers of this domain are...
Accepted AnswerSecurity
2
answers
0
votes
46
views
Javier
asked 14 days ago
I have an application deployed on on-prem server, is there a way to use only IAM role or policy to access AWS SDk. I dont want to provide or store the secret key and access key anywhere to access it....
2
answers
0
votes
50
views
Braj
asked 14 days ago
Hello, In one of my company's AWS account we have vulnerable information leak issue. AWS Batch jobs were launched with ENV variables and this variables contains very important and vulnerable details....
Accepted AnswerAWS BatchSecurity
1
answers
0
votes
44
views
asked 15 days ago
I am working on an IoT solution in which IoT devices send data to AWS Kinesis streams. Each device is identified by an IoT Thing Name, and we use this name (or its hashed value) as the Kinesis...
1
answers
0
votes
28
views
Balu
asked 16 days ago
Hi Team, We want to import AWS data into Jira Service Management (JSM) assets [cloud]. We do have a plugin in Atlassian Marketplace with the name - "Assets - AWS Integration" but currently is...
1
answers
0
votes
25
views
asked 17 days ago