Explore how you can quickly prepare for, respond to, and recover from security events. Learn more.
All Content tagged with Security, Identity, & Compliance
Secure your workloads and applications in the cloud
Content language: English
Select up to 5 tags to filter
Sort by most recent
1163 results
Hi everyone,
Over the past three months, we have been experiencing numerous issues with customer complaints regarding AWS CloudFront blocking access to various websites. Our customers are receiving a...
Hi,
This morning (UTC+3) I received couple of emails from AWS regarding missing CDK bootstrap buckets. The emails are titled in the format
> [Action Required] Missing CDK bootstrap bucket [AWS Accou...
I have a customer with 60+ AWS accounts. They would like to learn about best practices for storing root credential passwords and OTP seeds.
I suppose there are multiple ways of doing this, ranging fro...
I’m seeking clarification on AWS’s policies regarding the use of Amazon IVS (Interactive Video Service) for live streaming adult content. I’ve reviewed the Service Terms, Acceptable Use Policy, and co...
I've generated multiple public certificates using AWS Certificate Manager (ACM) for .com.au domains attached to CloudFront, trying both RSA 2048 and ECDSA P-256, but none receive Online Certificate St...
Can anyone help me understand the recent changes taking place for AWS CreateVolume and CreateSnapshot EBS API where we need to make changes in policy permissions.
Hello,
We have multiple aws account which we can access to through federated services. Each account is bind to a service.
I'm part of a transversal team, and i need access for support purposes on EC2 ...
I’m using AWS identity center, but I need to block the users outside the office ip range.
Is there any options to configure it in IAM identity center?
Are there any specific settings or policies I ne...
Im trying to understand how Datazone can improve my security and I just cant seem to make sense of the data that is there. It looks like nothing more than a bunch of predefined IAM roles. So why cant ...
Hello, I recently discovered that the eks-cluster-logging-enabled managed config rule is not available in us-gov-east-1. The documentation notes that it's supported in all regions though. [https://doc...
We are attempting to link a secured site (we got a certificate) to our domain, but we face difficulties that are not solved by the responses. I wonder if we can set a meeting with AWS team that was in...
I am reaching out to seek assistance regarding an issue with my AWS account. I am currently unable to perform certain actions in the AWS Management Console due to permission restrictions. The console ...