Questions tagged with Security, Identity, & Compliance
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
Came across claims that bedrock calls were HIPPA compliant even with OpenAI traffic, seeking clarification. Generally, medical documents must be sterilized before using public access models such as...
2
answers
0
votes
153
views
asked 3 months agolg...
Hi all,
my credential have been stolen. I changed my account password, but i am affraid that access keys are now in other hands.
I have EC2, RDS and VCP istances up and running. How i can ensure that...
2
answers
0
votes
156
views
asked 3 months agolg...
Hi,
Currently I would like to encrypt CloudTrail logs in my Root account via a KMS key managed by me.
This trail exists in all my environments due to the use of Control Tower, through the Root...
1
answers
0
votes
829
views
asked 3 months agolg...
Hi,
I am a software developer. I am following AWS machine learning learning path to explore the aws services and i want to prepare for aws machine learning speciality exam.
while exploring and...
1
answers
0
votes
140
views
asked 3 months agolg...
AWS will offer support for on-premises Amazon Linux 2023 images.
if yes, what kind of support they do provide?
what is the support subscription period and cost?
please help
1
answers
1
votes
122
views
asked 3 months agolg...
How to get end user's access-key and secret-access-key
by using accountId and registered email/username w.r.t "amazon s3" in spring boot application ?
1
answers
0
votes
337
views
asked 3 months agolg...
I would like to know how we can implement authorization logic (subscription method) on privatelink connection from the server (VPC endpoint defined in client and VPC EndPoint Service with an ALB...
3
answers
0
votes
115
views
asked 3 months agolg...
So I have some service in AWS that wants to be protected from unauthorized access. If I have a proxy and only the proxy have access to call the backend service based on a resource policy, I am curious...
1
answers
0
votes
376
views
asked 3 months agolg...
When I refer to this documentations: https://docs.aws.amazon.com/appsync/latest/devguide/merged-api.html, it seems like merged APIs are intended for development purposes only. Can we use a merged API,...
1
answers
0
votes
470
views
asked 3 months agolg...
Is there a way to determine if new software gets installed on an EC2, then get alerted about it? I know config gives a timeline of inventory changes, but not exactly what I'm looking for. Any ideas?
1
answers
0
votes
143
views
asked 3 months agolg...
Hello all,
I have a developer, who is a member of the organization's admin group in IAM, got this message (see below screenshot) when they tried to set up AWS Chatbot client for notifications in a...
2
answers
0
votes
117
views
asked 3 months agolg...
Find secret keylg...
Greetings,
I opened AWS console using IAM > Users > User
I opened the Security credentials tab where I can locate the Access keys.
I used the AWS CLI typing:
**aws configure get...
1
answers
0
votes
156
views
asked 3 months agolg...