Questions tagged with Security

The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.

Content language: English

Select up to 5 tags to filter
Sort by most recent

Browse through the questions and answers listed below or filter and sort to narrow down your results.

They don't stop to send pishing emails or try to access to my account, I got the servers of this domain are...
Accepted AnswerSecurity
2
answers
0
votes
45
views
Javier
asked 10 days ago
I have an application deployed on on-prem server, is there a way to use only IAM role or policy to access AWS SDk. I dont want to provide or store the secret key and access key anywhere to access it....
2
answers
0
votes
46
views
Braj
asked 10 days ago
Hello, In one of my company's AWS account we have vulnerable information leak issue. AWS Batch jobs were launched with ENV variables and this variables contains very important and vulnerable details....
Accepted AnswerAWS BatchSecurity
1
answers
0
votes
41
views
asked 11 days ago
I am working on an IoT solution in which IoT devices send data to AWS Kinesis streams. Each device is identified by an IoT Thing Name, and we use this name (or its hashed value) as the Kinesis...
1
answers
0
votes
27
views
Balu
asked 12 days ago
Hi Team, We want to import AWS data into Jira Service Management (JSM) assets [cloud]. We do have a plugin in Atlassian Marketplace with the name - "Assets - AWS Integration" but currently is...
1
answers
0
votes
21
views
asked 12 days ago
Hi, I have a rest API deployed on ECS and fronted with an ALB. I set a rule on WAF to block DDOS attack. If there are more than 10 request in one minute, then the requests should block. However, it...
1
answers
0
votes
60
views
profile picture
Efe
asked 12 days ago
2
answers
0
votes
49
views
asked 13 days ago
I have a web server which I do not want to expose to the entire internet. I know that legitimate requests to this server will come from {somewhere}.us-west-2.compute.amazonaws.com. How can I make a...
Accepted AnswerComputeSecurity
2
answers
0
votes
44
views
asked 13 days ago
Hi all I'm looking for some advice on to what extent Cognito's Custom Authentication (define-, create- and verify auth challenge lambdas) can integrate with 'Advanced Security' and adaptive...
0
answers
0
votes
25
views
reyes
asked 18 days ago
Hi AWS, I am installing vault server on Amazon Windows 11 platform. The steps I performed so far are: 1. Install vault executable zip. Unzipped it and store it inside location `C:\vault\vault.exe`. 2....
1
answers
0
votes
50
views
profile picture
asked 19 days ago
Has anyone here actually implemented this use case? It seems like it might just be a concept, so I'd love to hear detailed insights from anyone with practical...
1
answers
1
votes
50
views
asked 19 days ago
Hi everyone, I understand that I can use AWS WAF captcha feature with or without integrating with my application. What I do not fully understand is the differences between using captcha with...
Accepted AnswerAWS WAFDevOpsSecurity
1
answers
0
votes
72
views
AKMin
asked 19 days ago