All Content tagged with Security, Identity, & Compliance
Secure your workloads and applications in the cloud
Content language: English
Select up to 5 tags to filter
Sort by most recent
I am using AWS S3 as a block storage device to store mty documents.
We were using AccessKey and SecretKey combination from configuration files to connect to S3 and retrieve a document. So far so...
I am following a similar workflow as show in [this](https://stackoverflow.com/a/77529522/4352701) StackOverflow post. I have an SPA that runs at `admin.example.com` with API requests (via an...
I am using aws-azure-login and and below assumerole works
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
...
I'm experiencing an unexpected issue with my EC2 instances that I've been running for an extended period. Upon checking my web pages today, I discovered that one of my servers appears to have had its...
Hi everyone,
I wonder what should customers undergoing FedRamp do with EKS add-on images, which are not FIPS compliant?
Namely, those are 'kube-proxy', 'coredns', 'aws-ebs-csi-driver',...
Hi There,
I have created API Gateway, Lambda, and S3 for a customer workload for a non-prod environment and now the customer wants for production deployment so I have created a new AWS account for...
Hi,
How can I enforce the maker checker concept in user creation and assigning permissions to users / groups.
I.e. If an admin/root user assigning the services to the user, someone (other than the...
I tried to deploy Control Tower so that I can use AFT but I made a mistake when setting up Control Tower in that I chose the wrong region for my home region so the Control Tower deployment fails as...
I am currently managing a single AWS account that serves as both the management account and production environment. This account has accumulated 20k credits which apply to all accounts within the...
I've set up a passwordless login flow using AWS Cognito and want to improve the user experience based on patterns seen in popular apps:
![Sign-up /...
Hi,
We have created an App with a phone call feature and the US Users need to register their phone number before using it. To provide security to our app, and to avoid any phone number registration...
I'm digging into some corners of IAM conditions that I don't use a lot, and I've been testing some sample policies to make sure real-world behavior matches my assumptions.
I've created a role with...