Questions tagged with Security

The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.

Content language: English

Select up to 5 tags to filter
Sort by most recent

Browse through the questions and answers listed below or filter and sort to narrow down your results.

I have an application deployed on on-prem server, is there a way to use only IAM role or policy to access AWS SDk. I dont want to provide or store the secret key and access key anywhere to access it....
2
answers
0
votes
46
views
Braj
asked 9 days ago
Hello, In one of my company's AWS account we have vulnerable information leak issue. AWS Batch jobs were launched with ENV variables and this variables contains very important and vulnerable details....
Accepted AnswerAWS BatchSecurity
1
answers
0
votes
40
views
asked 10 days ago
I am working on an IoT solution in which IoT devices send data to AWS Kinesis streams. Each device is identified by an IoT Thing Name, and we use this name (or its hashed value) as the Kinesis...
1
answers
0
votes
27
views
Balu
asked 10 days ago
Hi Team, We want to import AWS data into Jira Service Management (JSM) assets [cloud]. We do have a plugin in Atlassian Marketplace with the name - "Assets - AWS Integration" but currently is...
1
answers
0
votes
20
views
asked 11 days ago
Hi, I have a rest API deployed on ECS and fronted with an ALB. I set a rule on WAF to block DDOS attack. If there are more than 10 request in one minute, then the requests should block. However, it...
1
answers
0
votes
58
views
profile picture
Efe
asked 11 days ago
2
answers
0
votes
48
views
asked 12 days ago
I have a web server which I do not want to expose to the entire internet. I know that legitimate requests to this server will come from {somewhere}.us-west-2.compute.amazonaws.com. How can I make a...
Accepted AnswerComputeSecurity
2
answers
0
votes
43
views
asked 12 days ago
Hi all I'm looking for some advice on to what extent Cognito's Custom Authentication (define-, create- and verify auth challenge lambdas) can integrate with 'Advanced Security' and adaptive...
0
answers
0
votes
25
views
reyes
asked 17 days ago
Hi AWS, I am installing vault server on Amazon Windows 11 platform. The steps I performed so far are: 1. Install vault executable zip. Unzipped it and store it inside location `C:\vault\vault.exe`. 2....
1
answers
0
votes
49
views
profile picture
asked 18 days ago
Has anyone here actually implemented this use case? It seems like it might just be a concept, so I'd love to hear detailed insights from anyone with practical...
1
answers
1
votes
48
views
asked 18 days ago
Hi everyone, I understand that I can use AWS WAF captcha feature with or without integrating with my application. What I do not fully understand is the differences between using captcha with...
Accepted AnswerAWS WAFDevOpsSecurity
1
answers
0
votes
70
views
AKMin
asked 18 days ago
I use CloudFront with AWS WAF to monitor requests. But after I enable AWS WAF, I can see nothing in the Security trends within a specified time range chart. I can see Robot requests within the...
4
answers
0
votes
90
views
Deep
asked 23 days ago