By using AWS re:Post, you agree to the AWS re:Post Terms of Use

All Content tagged with Security, Identity, & Compliance

Secure your workloads and applications in the cloud

Content language: English

Select up to 5 tags to filter
Sort by most recent
1163 results
Hi everyone, Over the past three months, we have been experiencing numerous issues with customer complaints regarding AWS CloudFront blocking access to various websites. Our customers are receiving a...
5
answers
0
votes
79
views
asked 2 months ago
Hi, This morning (UTC+3) I received couple of emails from AWS regarding missing CDK bootstrap buckets. The emails are titled in the format > [Action Required] Missing CDK bootstrap bucket [AWS Accou...
2
answers
2
votes
1.9K
views
asked 2 months ago
I have a customer with 60+ AWS accounts. They would like to learn about best practices for storing root credential passwords and OTP seeds. I suppose there are multiple ways of doing this, ranging fro...
1
answers
0
votes
66
views
AWS
asked 2 months ago
I’m seeking clarification on AWS’s policies regarding the use of Amazon IVS (Interactive Video Service) for live streaming adult content. I’ve reviewed the Service Terms, Acceptable Use Policy, and co...
1
answers
0
votes
67
views
asked 2 months ago
I've generated multiple public certificates using AWS Certificate Manager (ACM) for .com.au domains attached to CloudFront, trying both RSA 2048 and ECDSA P-256, but none receive Online Certificate St...
2
answers
0
votes
110
views
asked 2 months ago
Can anyone help me understand the recent changes taking place for AWS CreateVolume and CreateSnapshot EBS API where we need to make changes in policy permissions.
2
answers
0
votes
186
views
asked 2 months ago
Hello, We have multiple aws account which we can access to through federated services. Each account is bind to a service. I'm part of a transversal team, and i need access for support purposes on EC2 ...
3
answers
0
votes
61
views
asked 2 months ago
I’m using AWS identity center, but I need to block the users outside the office ip range. Is there any options to configure it in IAM identity center? Are there any specific settings or policies I ne...
2
answers
1
votes
84
views
asked 2 months ago
Im trying to understand how Datazone can improve my security and I just cant seem to make sense of the data that is there. It looks like nothing more than a bunch of predefined IAM roles. So why cant ...
2
answers
0
votes
58
views
profile picture
asked 2 months ago
Hello, I recently discovered that the eks-cluster-logging-enabled managed config rule is not available in us-gov-east-1. The documentation notes that it's supported in all regions though. [https://doc...
2
answers
0
votes
83
views
asked 2 months ago
We are attempting to link a secured site (we got a certificate) to our domain, but we face difficulties that are not solved by the responses. I wonder if we can set a meeting with AWS team that was in...
1
answers
0
votes
44
views
asked 2 months ago
I am reaching out to seek assistance regarding an issue with my AWS account. I am currently unable to perform certain actions in the AWS Management Console due to permission restrictions. The console ...
1
answers
0
votes
66
views
asked 2 months ago