Questions tagged with Security, Identity, & Compliance
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
There are many tutorials available for clustered Redshift, but there are no tutorials for the serverless type to connect it to Power BI. My issue is that I don't know how to configure Redshift for...
1
answers
0
votes
738
views
asked 7 months agolg...
During the security assessment conducted it is observed that the application is
configured with weak ciphers such as CBC that are found to be vulnerable to Lucky 13 attack and are not recommended for...
1
answers
0
votes
387
views
asked 7 months agolg...
Hi,
We are running into an issue where we have applied all the fixes for Findings reported by the AWS Inspector. But, the Inspector Dashboard still reports them as Active instead of Closed....
1
answers
0
votes
428
views
asked 7 months agolg...
We need a secure way to manage access to our AWS S3 files, following our company's confidentiality policies. We want to allow authorized users to download and view these files through our portal,...
3
answers
0
votes
262
views
asked 7 months agolg...
So it seems the authorization rules configuration in Client VPN endpoint wants to specify group ID (membership) from SAML claims. But what if users are authenticated using client certificates? Cannot...
1
answers
0
votes
442
views
asked 7 months agolg...
Hello everybody!
I am a newcomer and I need to create a new user with AWS access type 'Programmatic access - with an access key'.
I was able to create a user with 'administrator access' , create a...
2
answers
0
votes
536
views
asked 7 months agolg...
We're looking to use KMS and specifically select one country as part of this process, but can't find a setting to select this when creating a key.
Is there a step in the overall console that has to...
2
answers
0
votes
195
views
asked 7 months agolg...
What does the AWS security incident response planning look like?
How are the Risk Assessments done?
What is the SLA around notifications?
2
answers
0
votes
503
views
asked 7 months agolg...
Where can I find information about reporting security incidents or suspected data breaches to AWS?lg...
How do we notify AWS?
What are the security incident response plans in place by AWS to respond to a deal with these incidents?
2
answers
0
votes
175
views
asked 7 months agolg...
Shortly after logging in, the certificate appears to have been hijacked
Lightsail says there is no instance, but I actually have...
0
answers
0
votes
59
views
asked 7 months agolg...
I'm facing repeated account closures with AWS. They assert that the new accounts I create are somehow connected to prior closed accounts. My initial account closure was due to my inability to provide...
0
answers
0
votes
106
views
asked 7 months agolg...
I have an existing Cognito infrastructure where I have an app client for my website allowing login using the hosted UI, post-login I am using the provided access tokens to authenticate with my API...
0
answers
0
votes
157
views
asked 7 months agolg...