Help us improve the AWS re:Post Knowledge Center by sharing your feedback in a brief survey. Your input can influence how we create and update our content to better support your AWS journey.
Articles tagged with Security
The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.
Content language: English
Filter articles
Select tags to filter
Sort by
Sort by most recent
Browse through articles or filter your results using the tools displayed.
52 results
Harish MandhadiEXPERT
published 3 days ago0 votes56 views
AWS Security Agent closes the gap between fast-moving development and slow, end-of-cycle security reviews by embedding validation across design, code, and testing phases. Rather than treating security...
Henrique SantanaEXPERT
published 18 days ago0 votes32 views
Session CNS360 presented a layered security framework for serverless applications on AWS, from foundational IAM controls and API protection through OAuth 2.0 identity flows. The session also shows how...
shubhranshuEXPERT
published 24 days ago2 votes62 views
I'm using the Apache Airflow REST API in my Amazon Managed Workflows for Apache Airflow (Amazon MWAA) version 3.0 environment, and some API endpoints work while others return a `{"detail": "Forbidden"...

AWS OFFICIALUpdated 2 months ago1 votes180 views
This article shows you how to identify and secure open proxies in your AWS environment to prevent abuse, protect your IP address reputation, and control costs.
jonthomascampbellEXPERT
published 3 months ago0 votes91 views
Amazon EC2 instances that stop cleanly a few minutes after startup are often misinterpreted as experiencing infrastructure instability or hypervisor issues. In many cases, however, this behavior is ca...

AWS OFFICIALUpdated 3 months ago0 votes423 views
This article explains how to use AWS Unified Operations to address the operational challenges of running telecommunications (telecom) workloads at scale. Unified Operations addresses challenges from i...
AvinashEXPERT
published 5 months ago1 votes232 views
Purpose of this article is to offer general guidance on how to troubleshoot issues related to deployment of CrowdStrike Falcon Next-Gen SIEM for AWS through AWS Marketplace. It summarizes common issue...

AWS OFFICIALUpdated 4 months ago2 votes646 views
This article presents best practices that you can use to collect and manage security data, so that you can differentiate legitimate entities from threat actors.
Raks KhareEXPERT
published 5 months ago2 votes384 views
In multi-tenant Amazon Redshift environments, metadata security prevents tenants from viewing other tenants' schemas, tables, and system catalogs which is critical for security and compliance. This ha...
Purnaresa YEXPERT
published 5 months ago0 votes236 views
For Security Leaders and IT Executives to demonstrate quick value while building toward long-term strategic goals.
Purnaresa YEXPERT
published 6 months ago0 votes294 views
For platform engineers and security architects looking to embed automated
security controls into development workflows.

AWS OFFICIALUpdated 7 months ago1 votes1.8K views
This article explains how to use Simulated Conditions Response and Management (SCRaM) to enhance your incident response readiness. The article includes best practices and proactive activities that you...