Security, Identity, & Compliance
Securely run your business with the most flexible and secure cloud computing environment available. Benefit from AWS data centers and a network architected to protect your information, applications, and devices. Meet core security requirements, such as data locality, protection, and confidentiality with our comprehensive services and features.
Recent questions
see all1 / 18
-  I'm stumped but even with a brand new vanilla install of Firefox I always get the 'It's not you, it's us' error message if I try ...
- I have an AWS account where I’m logged in as the root user. In Visual Studio Code, I’m logged in to the Amazon Q extension using my Builder ID. When I clicked “Subscribe” in VS Code, a new browser pag...
- We are intermittently receiving the following error when using the AWS SDK for Rust to assume an IAM role: An error occurred while loading credentials The issue is not consistent sometimes the Assume...
- We have a number of M2M App Clients set up already but today when I try to add another one using the AWS Console I receive these errors: * [ScopeDoesNotExistException] Failed to create app client "tes...
- I’m raising a serious concern about the lack of Portuguese (Brazil) (pt-BR) language support in the AWS Cognito Managed Login UI (also known as the built-in or hosted login page). The current UI supp...
- Hello, I am attempting to setup amazon verified permissions, but I am hitting what seems to be a fairly strange limitation - it appears that I can only add a single Identity Source to my Policy Store....
- Hello, I am trying to setup an account to backup my NAS into a S3 bucket. I've created a IAM user with no console access, created a politic with those rules : ``` { "Version": "2012-10-17", "Statem...
- Hello! I am trying to create some basic certs for my domains with ACM. I cannot get any certs to pass validation despite having the correct DNS set up. I am using Route53 for my domains and hosted zon...
- We’re seeing recurring executions of an SSM document that are generating charges, but we don’t know the origin of those executions. I’ve checked the document itself and there are no obvious scheduled ...
- I am getting the following stacktrace from my Java client Exception in thread "main" software.amazon.awssdk.core.exception.SdkClientException: Profile file contained no credentials for profile 'profil...
- I want to run a signtool command on my local windows development machine that uses a code signing certificate which points to it's private key over AWS CloudHSM Cluster. Currently I am not able to con...
- Hello, I want to reuse the domain I purchased and once associated with an Amplify App that no longer exists. I am trying to create a new CloudFront distribution but it denies my apply and notifies tha...
- I have a Web App that uses Amazon Cognito for user authentication. The app’s login flow includes the “Forgot Password” feature, which uses Cognito’s built-in email verification process. When users sel...
- Hi, I am using AdminDisable User API to disable a user account, on repetitive failures to login. The documentation here https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_...
- i am planning on migrating claude from 3.5 to 4 and also want to implement cross region inference { "Version": "2012-10-17", "Statement": [ { "Sid": "BedrockKnowledgeBaseA...
- Hi everyone, I’m investigating some unexpected behavior with AWS Network Firewall and would appreciate input from the community. Configuration overview Environment: VPC with public and protected su...
- Hello everyone, I’m looking for advice on secure, scalable, and seamless API authorization best practices across multiple cloud platforms. Here’s the setup: I have an API Gateway deployed in AWS, pro...
- Ok, I'm a little bit lost. The back story: all the user account in my org are created on the IAM. So for a better management and CLI access I want to use the Identity Center like aws recommend doing s...
Recent Knowledge Center content
see all1 / 18
Recent articles
see all1 / 18
- AWS OfficialEXPERTpublished a day ago0 votes22 viewsThis article shows how organizations can use AWS Support to accelerate Australian Prudential Regulation Authority (APRA) compliance coverage.
- Hao SuEXPERTpublished 2 days ago0 votes14 viewsThe Default CloudWatch AWS namespace for Cognito does not currently support UserPool ID or App Client ID granularity
- samratmkEXPERTpublished 5 days ago2 votes56 viewsMigrating your AWS account to a new landing zone can lock you out of your Amazon EKS clusters. New SSO permission sets create different role names that break existing access. This guide helps you: -...
- AWS-WoleEXPERTpublished 9 days ago0 votes103 viewsThis article explores the benefits of implementing centralized root access, important considerations for adoption, and best practices for secure implementation. Whether you're a security professional ...
- Sankalp H TEXPERTpublished 10 days ago0 votes58 viewsThis article outlines steps to troubleshoot IAM permission issues when creating Amazon Bedrock Knowledge Bases with S3 Vectors storage configuration.
- Purnaresa YEXPERTpublished 18 days ago0 votes145 viewsEssential guide for security teams, compliance officers, and AWS administrators who need to investigate security incidents, monitor user activities, and perform audit analysis across multiple AWS acco...
- Tirth ParekhEXPERTpublished 19 days ago1 votes238 viewsThis Article provides information about DDoS attack and how various WAF Rule can work together to provide protection.
- SHAJAMEXPERTpublished 22 days ago0 votes102 viewsThe article discusses the benefits of Code Signing and shows how to sign code for AWS Lambda using AWS Signer
- SHAJAMEXPERTpublished a month ago0 votes178 viewsTalks about Service Linked Role which is a special IAM role. Discusses the differences with other IAM roles or policies and how to create it.
- Purnaresa YEXPERTpublished a month ago0 votes95 viewsA practical guide to implementing AWS Config using CloudFormation StackSets for comprehensive resource tracking
- Purnaresa YEXPERTpublished a month ago0 votes103 viewsA practical guide to implementing CIS IAM.18 compliance using CloudFormation StackSets
- Purnaresa YEXPERTpublished a month ago0 votes131 viewsA practical guide to implementing organization-wide password policies using CloudFormation StackSets
- Purnaresa YEXPERTpublished a month ago0 votes90 viewsA practical guide to implementing IAM best practices using Service Control Policies
- Purnaresa YEXPERTpublished a month ago0 votes95 viewsA practical guide to implementing account-level S3 Block Public Access using CloudFormation StackSets
- Purnaresa YEXPERTpublished a month ago0 votes95 viewsA practical guide to implementing security contact automation using CloudFormation StackSets
- Chandresh PatelEXPERTpublished a month ago1 votes315 viewsThis article explains how CloudFront Security Savings Bundle can save up to 30% on Amazon CloudFront costs through a 1-year monthly usage commitment. The savings apply to all CloudFront usage types. I...
- Mojgan-TothEXPERTpublished 2 months ago0 votes102 viewsData security in AWS requires vigilant monitoring, especially when it comes to protecting S3 buckets from unauthorized or suspicious deletions. In this comprehensive guide, we'll walk through setting ...
- Purnaresa YEXPERTpublished 2 months ago0 votes119 viewsA guide to understanding the risks and response when EC2 Instance IDs become public
Recent selections
see all1 / 10
- published a month ago1 votes102 viewsThis spotlight on Amazon Cognito equips you with the skills and troubleshooting best practices to get the most out of this cost effective service.
- Patrick KennedyEXPERTpublished a year ago0 votes891 viewsThis spotlight on IAM equips you with the skills and troubleshooting tips to get the most out of a powerful service.
- AWS OFFICIALUpdated 2 months ago7 votes22.2K viewsThe AWS Trust & Safety Center provides curated knowledge of AWS resources that can assist you in your cloud journey.
- Osvaldo MarteEXPERTpublished a year ago2 votes18.5K viewsThis selection focuses on the essential AWS networking services, providing a comprehensive overview of tools and technologies available to build and manage secure, scalable, and high-performing networ...
- Antonio LagrotteriaEXPERTpublished 2 years ago4 votes28K viewsA selection of architectural patterns and tips to leverage secure cross-account APIs, showing ingress, egress and inspection reference architectures
- Jonathan_DEXPERTpublished 2 years ago4 votes11.7K viewsDo you have critical workloads running in AWS? Review these handpicked resources to find ways to ensure your applications are resilient to failures.
- AWS OFFICIALUpdated 2 years ago0 votes23 viewsThis selection includes content and solutions supporting FSI related compliance and requirements covering security, immutable storage, and general guidance.
- AWS OFFICIALUpdated 2 years ago0 votes29 viewsAs a best practice, AWS recommends that you use AWS Identity and Access Management (IAM) roles instead of IAM users with long-term credentials such as access keys.
- AWS OFFICIALUpdated 2 years ago0 votes6 viewsAccelerate your business transformation goals with a managed service that combines compute, network and storage capabilities in a fully supported, ready-to-run service from VMware and AWS.
- AWS OFFICIALUpdated 2 years ago0 votes7.9K viewsAre you getting 403 Access Denied errors with your Amazon Simple Storage Service (Amazon S3) operations? Review this list of handpicked resources to identify the root cause and troubleshooting instruc...
1 / 18
Riku_Kobayashi
EXPERTGary Mclean
EXPERTsecondabhi_aws
EXPERTOleksii Bebych
EXPERTGreg
EXPERTOsvaldo Marte
EXPERTSedat SALMAN
EXPERTKidd Ip
EXPERTAdeleke Adebowale .J.
EXPERTBehrens, Isaac
EXPERTTushar Jagdale
EXPERTMatt Barbieri
EXPERTAWS-User-alantam
EXPERTIndranil Banerjee AWS
EXPERTTakahito Iwasa
EXPERTGK
EXPERTMassimilianoAWS
EXPERT
Learn AWS faster by following popular topics
1 / 4
