Security, Identity, & Compliance
Securely run your business with the most flexible and secure cloud computing environment available. Benefit from AWS data centers and a network architected to protect your information, applications, and devices. Meet core security requirements, such as data locality, protection, and confidentiality with our comprehensive services and features.
Recent questions
see all1 / 18
- EMERGENCY SITUATION - AWS SUPPORT COMPLETELY BROKEN I need immediate AWS staff intervention. This is beyond unacceptable. SHOCKING EVIDENCE: ✗ Case #176205182700045: 8 DAYS unassigned ✗ Case #176240...
- We need 'Last Logon Time' and 'When Created' to also be available as part of AWS Directory Service Data attributes. Is there a way, we could get it using boto3 ?
- My identity source is already set and a portal URL is already present. I wish to change it and I don't see any option to do so in the UI. Any other option to do so via CLI or AWS support?
-  I'm stumped but even with a brand new vanilla install of Firefox I always get the 'It's not you, it's us' error message if I try ...
- I have an AWS account where I’m logged in as the root user. In Visual Studio Code, I’m logged in to the Amazon Q extension using my Builder ID. When I clicked “Subscribe” in VS Code, a new browser pag...
- We are intermittently receiving the following error when using the AWS SDK for Rust to assume an IAM role: An error occurred while loading credentials The issue is not consistent sometimes the Assume...
- We have a number of M2M App Clients set up already but today when I try to add another one using the AWS Console I receive these errors: * [ScopeDoesNotExistException] Failed to create app client "tes...
- I’m raising a serious concern about the lack of Portuguese (Brazil) (pt-BR) language support in the AWS Cognito Managed Login UI (also known as the built-in or hosted login page). The current UI supp...
- Hello, I am attempting to setup amazon verified permissions, but I am hitting what seems to be a fairly strange limitation - it appears that I can only add a single Identity Source to my Policy Store....
- Hello, I am trying to setup an account to backup my NAS into a S3 bucket. I've created a IAM user with no console access, created a politic with those rules : ``` { "Version": "2012-10-17", "Statem...
- Hello! I am trying to create some basic certs for my domains with ACM. I cannot get any certs to pass validation despite having the correct DNS set up. I am using Route53 for my domains and hosted zon...
- We’re seeing recurring executions of an SSM document that are generating charges, but we don’t know the origin of those executions. I’ve checked the document itself and there are no obvious scheduled ...
- I am getting the following stacktrace from my Java client Exception in thread "main" software.amazon.awssdk.core.exception.SdkClientException: Profile file contained no credentials for profile 'profil...
- I want to run a signtool command on my local windows development machine that uses a code signing certificate which points to it's private key over AWS CloudHSM Cluster. Currently I am not able to con...
- Hello, I want to reuse the domain I purchased and once associated with an Amplify App that no longer exists. I am trying to create a new CloudFront distribution but it denies my apply and notifies tha...
- I have a Web App that uses Amazon Cognito for user authentication. The app’s login flow includes the “Forgot Password” feature, which uses Cognito’s built-in email verification process. When users sel...
- Hi, I am using AdminDisable User API to disable a user account, on repetitive failures to login. The documentation here https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_...
- i am planning on migrating claude from 3.5 to 4 and also want to implement cross region inference { "Version": "2012-10-17", "Statement": [ { "Sid": "BedrockKnowledgeBaseA...
Recent Knowledge Center content
see all1 / 18
Recent articles
see all1 / 18
- N_AgarwalEXPERTpublished 2 hours ago0 votes5 viewsGoogle Chrome’s deprecation of public TLS certificates with clientAuth Extended Key Usage (EKU), effective June 15, 2026, impacts AWS Certificate Manager (ACM) users importing non-AWS CA certificates....
- AWS OfficialEXPERTpublished 4 days ago0 votes66 viewsThis article shows how organizations can use AWS Support to accelerate Australian Prudential Regulation Authority (APRA) compliance coverage.
- Hao SuEXPERTpublished 5 days ago0 votes18 viewsThe Default CloudWatch AWS namespace for Cognito does not currently support UserPool ID or App Client ID granularity
- samratmkEXPERTpublished 7 days ago2 votes65 viewsMigrating your AWS account to a new landing zone can lock you out of your Amazon EKS clusters. New SSO permission sets create different role names that break existing access. This guide helps you: -...
- AWS-WoleEXPERTpublished 12 days ago0 votes119 viewsThis article explores the benefits of implementing centralized root access, important considerations for adoption, and best practices for secure implementation. Whether you're a security professional ...
- Sankalp H TEXPERTpublished 12 days ago0 votes69 viewsThis article outlines steps to troubleshoot IAM permission issues when creating Amazon Bedrock Knowledge Bases with S3 Vectors storage configuration.
- Purnaresa YEXPERTpublished 21 days ago0 votes164 viewsEssential guide for security teams, compliance officers, and AWS administrators who need to investigate security incidents, monitor user activities, and perform audit analysis across multiple AWS acco...
- Tirth ParekhEXPERTpublished 22 days ago1 votes253 viewsThis Article provides information about DDoS attack and how various WAF Rule can work together to provide protection.
- SHAJAMEXPERTpublished 25 days ago0 votes111 viewsThe article discusses the benefits of Code Signing and shows how to sign code for AWS Lambda using AWS Signer
- SHAJAMEXPERTpublished a month ago0 votes195 viewsTalks about Service Linked Role which is a special IAM role. Discusses the differences with other IAM roles or policies and how to create it.
- Purnaresa YEXPERTpublished a month ago0 votes100 viewsA practical guide to implementing AWS Config using CloudFormation StackSets for comprehensive resource tracking
- Purnaresa YEXPERTpublished a month ago0 votes106 viewsA practical guide to implementing CIS IAM.18 compliance using CloudFormation StackSets
- Purnaresa YEXPERTpublished a month ago0 votes134 viewsA practical guide to implementing organization-wide password policies using CloudFormation StackSets
- Purnaresa YEXPERTpublished a month ago0 votes95 viewsA practical guide to implementing IAM best practices using Service Control Policies
- Purnaresa YEXPERTpublished a month ago0 votes110 viewsA practical guide to implementing account-level S3 Block Public Access using CloudFormation StackSets
- Purnaresa YEXPERTpublished a month ago0 votes105 viewsA practical guide to implementing security contact automation using CloudFormation StackSets
- Chandresh PatelEXPERTpublished 2 months ago1 votes326 viewsThis article explains how CloudFront Security Savings Bundle can save up to 30% on Amazon CloudFront costs through a 1-year monthly usage commitment. The savings apply to all CloudFront usage types. I...
- Mojgan-TothEXPERTpublished 2 months ago0 votes104 viewsData security in AWS requires vigilant monitoring, especially when it comes to protecting S3 buckets from unauthorized or suspicious deletions. In this comprehensive guide, we'll walk through setting ...
Recent selections
see all1 / 10
- published a month ago1 votes107 viewsThis spotlight on Amazon Cognito equips you with the skills and troubleshooting best practices to get the most out of this cost effective service.
- Patrick KennedyEXPERTpublished a year ago0 votes894 viewsThis spotlight on IAM equips you with the skills and troubleshooting tips to get the most out of a powerful service.
- AWS OFFICIALUpdated 2 months ago7 votes22.3K viewsThe AWS Trust & Safety Center provides curated knowledge of AWS resources that can assist you in your cloud journey.
- Osvaldo MarteEXPERTpublished a year ago2 votes18.5K viewsThis selection focuses on the essential AWS networking services, providing a comprehensive overview of tools and technologies available to build and manage secure, scalable, and high-performing networ...
- Antonio LagrotteriaEXPERTpublished 2 years ago4 votes28K viewsA selection of architectural patterns and tips to leverage secure cross-account APIs, showing ingress, egress and inspection reference architectures
- Jonathan_DEXPERTpublished 2 years ago4 votes11.7K viewsDo you have critical workloads running in AWS? Review these handpicked resources to find ways to ensure your applications are resilient to failures.
- AWS OFFICIALUpdated 2 years ago0 votes26 viewsThis selection includes content and solutions supporting FSI related compliance and requirements covering security, immutable storage, and general guidance.
- AWS OFFICIALUpdated 2 years ago0 votes30 viewsAs a best practice, AWS recommends that you use AWS Identity and Access Management (IAM) roles instead of IAM users with long-term credentials such as access keys.
- AWS OFFICIALUpdated 2 years ago0 votes14 viewsAccelerate your business transformation goals with a managed service that combines compute, network and storage capabilities in a fully supported, ready-to-run service from VMware and AWS.
- AWS OFFICIALUpdated 2 years ago0 votes7.9K viewsAre you getting 403 Access Denied errors with your Amazon Simple Storage Service (Amazon S3) operations? Review this list of handpicked resources to identify the root cause and troubleshooting instruc...
1 / 18
Riku_Kobayashi
EXPERTGary Mclean
EXPERTsecondabhi_aws
EXPERTOleksii Bebych
EXPERTGreg
EXPERTOsvaldo Marte
EXPERTSedat SALMAN
EXPERTKidd Ip
EXPERTAdeleke Adebowale .J.
EXPERTBehrens, Isaac
EXPERTTushar Jagdale
EXPERTMatt Barbieri
EXPERTAWS-User-alantam
EXPERTIndranil Banerjee AWS
EXPERTTakahito Iwasa
EXPERTMassimilianoAWS
EXPERTGK
EXPERT
Learn AWS faster by following popular topics
1 / 4
