Questions tagged with Security

The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.

Content language: English

Select up to 5 tags to filter
Sort by most recent

Browse through the questions and answers listed below or filter and sort to narrow down your results.

1216 results
After configuring an explicit deny rule (TCP Deny Any Any) in AWS Network Firewall, I noticed that the Suricata and domain list rules became ineffective due to their dependency on the TLS handshake...
2
answers
0
votes
301
views
asked 2 months ago
I need to create a Lambda function that validates whether each IAM user in an AWS account has MFA enabled. If a user does not have MFA, I need to trigger another Lambda function to handle that user...
3
answers
0
votes
320
views
asked 2 months ago
Im checking the possibility of using AWS Cloud wan for my organization, When considering the Segment, i have environment like dev, qa, uat, prod. Also im having on prem data centers. So for the...
Accepted AnswerSecurityAWS Cloud WAN
2
answers
2
votes
315
views
asked 2 months ago
Hi AWS, I am planning to write an SCP for the following: 1. MFA should be enabled for all IAM users. 2. Hardware MFA should be enabled for the root user. 3. MFA should be enabled for the root...
3
answers
0
votes
298
views
profile picture
asked 2 months ago
Hi AWS, I am writing an SCP to enable **AWS Config** and **AWS GuardDuty**. The approved regions are `us-east-1`, `us-east-2`, `us-west-1`. Here is the SCP code: ``` { "Version": "2012-10-17", ...
2
answers
0
votes
297
views
profile picture
asked 2 months ago
I'm trying to set up patch manager to automatically scan for updates to dependencies of my EC2 instances running AL2023. I've followed [this guide...
1
answers
0
votes
330
views
Bill
asked 2 months ago
Hello everyone, I am learning about VPCs, and I have questions about how to design them, along with subnets. I put a practical example to be able to raise the doubts: Imagine that we have an...
Accepted AnswerAmazon VPCSecurity
1
answers
0
votes
299
views
Daniel
asked 2 months ago
My account has been compromised. I have bills for for services I did not consume. I need help please
1
answers
0
votes
272
views
Melvis
asked 2 months ago
I want to migrate my Cognito user pool from one AWS account to another for some business related reasons. However for migration I saw that the following url lists the approaches to do the migration...
Accepted AnswerAmazon CognitoSecurity
1
answers
0
votes
304
views
Srushti
asked 2 months ago
Hi, IHAC that is looking for the encryption options for EBS volumes and wants to correlate with the options they used on other cloud platform as: There are 3 options e when encrypting the disks of a...
1
answers
0
votes
313
views
AWS
asked 2 months ago
I have created a WebACL and added some rule groups in count mode. Before turning rule actions to Block (or Challenge/Captcha) I would like to evaluate potential impact on my web application. With AWS...
1
answers
0
votes
404
views
AWS
Piotrek
asked 2 months ago
I am setting up an Amazon GuardDuty and I am interested in the VPC Traffic Flow Logs collected and sent to GuardDuty. Can I customize this Traffic? For example, in my Account there are 5 VPCs and I...
1
answers
0
votes
519
views
LinhCN
asked 2 months ago