Unanswered Questions tagged with Security
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
Context:
I have a setup with an existing VPC with sensitive payloads, in terms of security.
I would like to setup DataSync (ideally on AWS EC2) so that a task can synchronise an MS Azure Blob Storage...
0
answers
0
votes
2
views
asked 24 minutes agolg...
For a recent proof of concept I was looking into a way to integrate AppSync, ALB and Cognito and I was wondering if what I did was correct or can be improved as I wasn't able to find a solution "off...
0
answers
0
votes
192
views
asked 2 months agolg...
Has anyone connected an Azure Web API to an AWS SQL Server?
I'm trying to determine why my Azure Web API isn't able to communicate with my new AWS SQL Server database. I previously was connected...
0
answers
0
votes
123
views
asked 2 months agolg...
Hi AWS community,
if my understanding is correct, the documentation would be lacking and the rule logic may not be enough to detect lambda functions which are public.
Documentation:
What...
0
answers
0
votes
86
views
asked 2 months agolg...
Hi,
We're evaluating moving our application deployments from Kubernetes to ECS, but one of the requirements we're struggling with in ECS is command execution. We experimented with ECS Exec, but it...
0
answers
1
votes
93
views
asked 2 months agolg...
I'm encountering connectivity issues while deploying ECS services in bridge network mode within private subnets.
The architecture involves a mix of internal and external services, where awsvpc is...
0
answers
0
votes
226
views
asked 3 months agolg...
I am fairly new to AWS and wanted to understand CORS behavior for various "AllowedOrigins" in the CORS policy.
1. If AllowedOrigin has wildcard (*) as a part or has an explicit origin mentioned...
0
answers
0
votes
74
views
asked 3 months agolg...
I want to specific where happend TLS v1 traffic. I see a below list at AWS Health Dashboard. But I'm not sure the detail. What is this IP? Where is the ARN?
![Enter image description...
0
answers
0
votes
128
views
asked 4 months agolg...
Hello ,
Can any body please help me with documentation .
i want bring data (events , matrices , inventory ) of SD-WAN, layer 2 , layer 3 devices to Aws and store in Aws and expose to website...
0
answers
0
votes
78
views
asked 4 months agolg...
Hello,
I am working on implementing push notifications for our end-user app (iOS only right now), and I am looking to write a policy that allows the currently logged in Cognito User to update their...
0
answers
0
votes
193
views
asked 6 months agolg...
How to Enforce User-Based Resource Isolation in Amazon SageMaker Studio with ADFS Authentication?lg...
I'm configuring Amazon SageMaker Studio and aim to implement user-based resource isolation. Specifically, I want each ADFS-authenticated user to only access their corresponding Amazon SageMaker user...
0
answers
0
votes
111
views
asked 6 months agolg...
I have created a new OpenSearch collection with network access Policy as Public and created a data access policy with an IAM user. Using this IAM user, I am able to create/access/query indices from...
0
answers
0
votes
72
views
asked 7 months agolg...