Questions tagged with Security, Identity, & Compliance
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
Hi there!
We want to use AWS IoT Core for our Internet of Things-related project. Our goal is to build smart devices such as bulbs and mobile/web applications for them. We feel that the IoT service...
1
answers
0
votes
247
views
asked 8 months agolg...
After linking a CodeCatalyst space to a AWS account, the account becomes responsible for all costs caused by the space. From the documentation, this seems like a de facto cart blanche. How to limit...
1
answers
0
votes
221
views
asked 8 months agolg...
AWS was supposedly sent out an address confirmation card with a code on it. How long does that card take to get to the individual?
1
answers
0
votes
151
views
asked 8 months agolg...
Good morning team,
The security team mandates scanning our CDK code for security measures to avoid deploying potentially harmful code.
Do you have recommendations or best practices for tools that...
2
answers
0
votes
283
views
asked 8 months agolg...
i need to publish and subscribe
1
answers
0
votes
223
views
asked 8 months agolg...
### The direction of access control I want is as follows.
1. Make certain users accessible only to certain DBs
2. Can see what privileges a particular user has on a particular DB (Select, insert,...
2
answers
0
votes
205
views
asked 8 months agolg...
I have been using AWS Chime for recording and transcriptions for a few months with no issues and recently have encountered the following error:
AccessDenied: User:...
1
answers
0
votes
239
views
asked 8 months agolg...
Hi AWS Community,
Recently, I encountered a distressing issue with AWS Support. My AWS account was placed under verification, and during this period, all my access and privileges were revoked until I...
0
answers
0
votes
93
views
asked 8 months agolg...
Hello,
Is there a canonical way to give the AWS SSM agent running on a hybrid-activated (on-prem) system an AWS IAM identity? The example use case would be that I would like the SSM agent on the...
2
answers
0
votes
280
views
asked 9 months agolg...
I've configured a VPN endpoint with Federated authentication using Azure as the SAML provider. However, I'm facing an issue with the Authorization rules. When I choose "Allow access to users in a...
1
answers
0
votes
342
views
asked 9 months agolg...
Hey everyone,
There is one scenario i have noticed today. So i have one user which has administrator access i wanted that none of the othe users should be able to perform any actions on this user...
1
answers
0
votes
288
views
asked 9 months agolg...
I received the following message: "You have been engaged in activity that resembles attempts to access remote hosts on the Internet without authorization. Activity of this nature is prohibited in the...
Accepted AnswerSecurity, Identity, & Compliance
3
answers
0
votes
219
views
asked 9 months agolg...