By using AWS re:Post, you agree to the AWS re:Post Terms of Use

All Content tagged with Security, Identity, & Compliance

Secure your workloads and applications in the cloud

Content language: English

Select up to 5 tags to filter
Sort by most recent
1163 results
Hi there, Im reaching out with a query about Security Hub Thing is, Im a beginner with Security Hub and our company recently started the project for deploying & tracking the Security findings throug...
1
answers
0
votes
135
views
asked 2 months ago
For security compliance, my team wonders how AWS AppSync handles subscription arguments behind the scenes. * Are the arguments stored in the Appsync memory temporarily, and are they disposed of after ...
1
answers
0
votes
101
views
asked 2 months ago
Hi, I'm looking to use Identity Center as the SAML IdP to connect to AD-joined AppStream. The basics are working, but we're looking to implement Certificate-Based Authentication (CBA). This requires ...
2
answers
0
votes
63
views
asked 2 months ago
Hello, I am currently researching the capabilities of AWS Inspector, but I am unable to find whether it can monitor S3 components or not. Are there also any components that cannot be monitored by AWS ...
2
answers
0
votes
135
views
asked 2 months ago
We have an AWS Organizations org and are addressing findings from SecurityHub. The most common critical finding is that none of the root users for any of the accounts in the org have hardware MFA ena...
2
answers
0
votes
71
views
asked 2 months ago
I need the Winter SOC 1 report, but when I go to Artifact, the only one that allows downloads is the most current. Any ideas on how to access those historical SOC 1 reports?
1
answers
0
votes
99
views
asked 2 months ago
Hypothetical question for planning: - one AWS org - two accounts - Prod, DR - shared CMK created in Prod, used to snapshot and copy volume to DR account If the Prod account is compromised but DR rem...
1
answers
0
votes
64
views
asked 2 months ago
I am using AWS S3 as a block storage device to store mty documents. We were using AccessKey and SecretKey combination from configuration files to connect to S3 and retrieve a document. So far so good....
2
answers
0
votes
82
views
asked 3 months ago
I am following a similar workflow as show in [this](https://stackoverflow.com/a/77529522/4352701) StackOverflow post. I have an SPA that runs at `admin.example.com` with API requests (via an OpenAPI-g...
1
answers
0
votes
93
views
asked 3 months ago
I am using aws-azure-login and and below assumerole works { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Federa...
1
answers
0
votes
82
views
asked 3 months ago
I'm experiencing an unexpected issue with my EC2 instances that I've been running for an extended period. Upon checking my web pages today, I discovered that one of my servers appears to have had its ...
2
answers
0
votes
90
views
asked 3 months ago
Hi everyone, I wonder what should customers undergoing FedRamp do with EKS add-on images, which are not FIPS compliant? Namely, those are 'kube-proxy', 'coredns', 'aws-ebs-csi-driver', 'aws-network-po...
1
answers
0
votes
261
views
profile pictureAWS
asked 3 months ago