AWS Shield Network Security Director helps you visualize network resources, identify risks, and strengthen security through guided remediation. Use natural language to investigate findings and strengthen security posture with Amazon Q Developer. Get started.
Security, Identity, & Compliance
Securely run your business with the most flexible and secure cloud computing environment available. Benefit from AWS data centers and a network architected to protect your information, applications, and devices. Meet core security requirements, such as data locality, protection, and confidentiality with our comprehensive services and features.
Recent questions
see all1 / 18
- Hi, I’m experiencing an issue with the EC2 launch interface in the AWS Console. When I log in using my IAM user (`admin`), I do not see the “Free Tier eligible” badges next to AMIs or instance types...
- How can I get AWS Credentials (Access key, Security key, etc...) through the use of mwinit or ada? For our use case, we do not want to use or have IAM User account, the authentication or getting the...
- **Service:** AWS Amplify **SDK:** @aws-amplify/ui-react (v6) **Question Details:** I'm using aws-amplify v6 with next.js and the @aws-amplify/ui-react Authenticator component. The authentication flow...
- Hello, I was making some tests yesterday regarding certificates and I created 2 public exportable certificates with wild card, incurring in a charge of $149 each. I do not want to use them, but I am ...
- I have been working on getting an IoT fleet set up and I am torn with documentation vs sample code. Based on [this](https://catalog.us-east-1.prod.workshops.aws/workshops/7c2b04e7-8051-4c71-bc8b-6d2d7...
- Hi, I have a customer that has about 50 accounts within their organization, I would like to ask what is the procedure that needs to be done, in order to request in one bulk to remove the SMTP restrict...
- Hi all, I’ve been using AWS Audit Manager to assess an AWS Account against ISO27001 annex A compliance. I have also AWS Config and AWS Security Hub enabled. As suggested in https://docs.aws.amazon...
- I'm consistently receiving 403 Forbidden errors when trying to index documents into a new OpenSearch Serverless collection, even though I've verified all IAM and AOSS policies are correctly configured...
- aws charges my account $1 every month for KMS(Key Management Service). In my KMS console, I don't have any customer managed key, And there is only one aws managed key with alias "aws/lambda" but I di...
- I am trying to run basic queries on MIMIC III but I get the error. Query: SELECT * FROM "AwsDataCatalog"."mimiciii"."admissions" limit 10; There is no issue of permission from my end for AWS user. ...
- Hi all I'm in the middle of AWS Network firewall configuration. I created a TLS inspection configuration and Firewall policy. In the Firewall policy console, I see the "TLS inspection configuration" ...
- Ola Pessoal, Comecei a receber alerta critico de invasao pelo GuardDuty dia 02/07 as 07:40. Adicionei policies IAM para negar , S3, EC2, ExecAPI e IAM , padrao usado: "Effect": "Deny", "Action": ...
- Getting below error while creating stack from my aws account : 2169-8913-0146 The following resource(s) failed to create: [EntitlementSQSHandlerMySQSEvent, SubscriptionSQSHandlerMySQSEvent].
- We are operating over 30 AWS accounts, each representing a separate environment. I access these accounts via switch roles. As part of our internal audit process, we are reviewing IAM users whose last...
- We have configured MSK Provisioned Cluster. I have done authentication from on-prem with Spring boot OAUTHBEARER with awsProfile. in jaas config sasl.jaas.config = org.apache.kafka.common.security.oa...
- I have a main management account and I want to access information in a another account through a Lambda function. Let an imaginary use case be pushing an object into an S3 bucket in the main account w...
- The issue commenced when attempting to set up AWS Config for all the accounts connected to AWS Control Tower. There are issues when attempting to change the IAM role for Config to service-linked role ...
- As a user, how can I change my 2FA authentication method from using the authenticator app, to using the fingerprint scanner on my macbook? I am able to assign 2FA methods from the root user, but ther...
Recent Knowledge Center content
see all1 / 18
Recent articles
see all1 / 18
- Sophia YangEXPERTpublished 16 hours ago1 votes19 viewsSecurity teams can use IAM Access Analyzer to inventory who has access to their organization's critical resources
- Joanna KEXPERTpublished 7 days ago0 votes86 viewsYou're a Shield Advanced customer who's noticed the new rulegroup and/or have received an email 'Enhanced L7 DDoS Protection for AWS Shield Advanced Customers' and want to know more
- Purnaresa YEXPERTpublished 7 days ago0 votes111 viewsThis article demonstrates a proof of concept for implementing enterprise security governance to prevent unauthorized security group modifications while maintaining development team flexibility using A...
- AWS OFFICIALUpdated 7 days ago0 votes82 viewsThis article demonstrates how AWS Enterprise Support helped a financial services customer implement a comprehensive database event monitoring solution. The solution used Amazon Relational Database Ser...
- Purnaresa YEXPERTpublished 9 days ago0 votes128 viewsThis article demonstrates a simple proof of concept to retrieve the original client IP address when using Application Load Balancer with EC2 instances.
- AWS OFFICIALUpdated 7 days ago0 votes98 viewsThis article explores how AWS Enterprise Support helped Stripe achieve record-breaking success during the Black Friday and Cyber Monday (BFCM) period in 2024. This case study explores the strategic pa...
- Aakash_SSUPPORT ENGINEERpublished 14 days ago0 votes79 viewsIn this article, we'll explore an innovative method to remove encryption from Amazon EBS volumes using the 'CreateStoreImageTask' API. This approach leverages AWS infrastructure without requiring addi...
- AWS OFFICIALUpdated 16 days ago0 votes125 viewsThis article explores how organizations can implement solutions for robust controls for DeepSeek AI models across their organization. Specifically, this article explains how to have granular control o...
- NahuelEXPERTpublished 22 days ago0 votes87 viewsExplore the scaling option available for AWS Managed Microsoft AD and, the monitoring tools available to decide when to scale.
- AWS rePost LiveEXPERTpublished a month ago0 votes70 viewsAWS re:Inforce 2025 is kicking off and we will be coming to you live from Philadelphia, PA on July 17th!
- Arun NagpalEXPERTpublished a month ago0 votes89 viewsEffectively managing where your web traffic originates is a cornerstone of modern web security. AWS WAF’s ASN (Autonomous System Number) matching feature equips you with precise control over access to...
- Alexandra HuidesEXPERTpublished a month ago0 votes405 viewsThis article shows a step by step example of how to use SPIFFE-SVID with VPC Lattice for AuthN/Z
- rajawsSUPPORT ENGINEERpublished a month ago1 votes138 viewsThis article demonstrates how to use Python and AWS Lambda to automate the deletion of Amazon Q data integrations in Amazon Connect. Using Python's boto3 library to call Amazon Connect APIs, this solu...
- AWS rePost LiveEXPERTpublished 2 months ago0 votes80 viewsJoin us live on [Twitch.tv](https://bit.ly/4anH9WR) on May 20th, 2025 @ 2pm Pacific / 5pm Eastern to hear our hosts explain Securing the Cloud with AWS Central Root Access Management
- Mojgan-TothEXPERTpublished 2 months ago1 votes300 viewsUnderstanding the Core AWS Services for Zero Trust Security
- Joanna KEXPERTpublished 2 months ago0 votes385 viewsI'm under attack!! How can I protect myself using AWS WAF?
- Joanna KEXPERTpublished 2 months ago0 votes206 viewsThere are many options to configure HTTP redirects being issued from CloudFront this article covers them - while the specific use-case here is ACM HTTP validation redirect, the options apply to all H...
- Andreas LindhEXPERTpublished 2 months ago0 votes276 viewsThe article provides a guide for integrating an organization's external PKI with AWS Private CA and cert-manager to enable dynamic certificate management for workloads running on Amazon EKS, allowing ...
Recent selections
see all1 / 6
- Patrick KennedyEXPERTpublished 8 months ago0 votes835 viewsThis spotlight on IAM equips you with the skills and troubleshooting tips to get the most out of a powerful service.
- AWS OFFICIALUpdated 2 months ago6 votes15.3K viewsThe AWS Trust & Safety Center provides curated knowledge of AWS resources that can assist you in your cloud journey.
- Osvaldo MarteEXPERTpublished a year ago2 votes18.5K viewsThis selection focuses on the essential AWS networking services, providing a comprehensive overview of tools and technologies available to build and manage secure, scalable, and high-performing networ...
- Antonio_LagrotteriaEXPERTpublished a year ago4 votes27.9K viewsA selection of architectural patterns and tips to leverage secure cross-account APIs, showing ingress, egress and inspection reference architectures
- Jonathan_DEXPERTpublished 2 years ago4 votes11.4K viewsDo you have critical workloads running in AWS? Review these handpicked resources to find ways to ensure your applications are resilient to failures.
- AWS OFFICIALUpdated 2 years ago0 votes7.8K viewsAre you getting 403 Access Denied errors with your Amazon Simple Storage Service (Amazon S3) operations? Review this list of handpicked resources to identify the root cause and troubleshooting instruc...
1 / 18
Riku_Kobayashi
EXPERTGary Mclean
EXPERTsecondabhi_aws
EXPERTOleksii Bebych
EXPERTGreg_B
EXPERTOsvaldo Marte
EXPERTSedat Salman
EXPERTAdeleke Adebowale Julius
EXPERTiBehr
EXPERTTushar_J
EXPERTMatt-B
EXPERTKidd Ip
EXPERTAWS-User-alantam
EXPERTIndranil Banerjee AWS
EXPERTiwasa
EXPERTGanesh Kudikala
EXPERTMassimilianoAWS
EXPERT
Learn AWS faster by following popular topics
1 / 4