Questions tagged with Security
The security pillar focuses on protecting information and systems. Key topics include confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events.
Content language: English
Filter questions
Select tags to filter
Sort by
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
1374 results
So most of the topology is like following when we have a fleet of Firewalls behind gwlb:
Traffic A to B: A -> GWLBE -> GWLB -> FW(with Geneve decapsulation/encapsulation) -> GWLBE -> B
Response B to A...
1
answers
0
votes
13
views
asked a day ago
I have enabled Cognito App Client to have refresh token rotation. Using the js sdk, I am able to make requests to rotate tokens by using current refresh token and command `GetTokensFromRefreshTokenCom...
2
answers
0
votes
36
views
asked 2 days ago
How can I design a secure architecture for a public-facing API on AWS when the application interacts with multiple backend services (databases, event-driven components, and external APIs) while ensuri...
Accepted AnswerSecurity
1
answers
0
votes
36
views
asked 8 days ago
What’s the recommended way to test whether my Bedrock application is resistant to prompt injection and jailbreaks before going to production?
1
answers
0
votes
30
views
asked 8 days ago
I am trying Inspector Code Security
Connected a GitHub repo with several projects. Those projects show up in the Code Security repository list.
I selected each and clicked on 'On-demand Scan'. A mess...
Accepted AnswerSecurity
3
answers
0
votes
26
views
asked 10 days ago
Greetings all,
When working on complex network ACL, we sometimes have to enter IP Addresses - Looking back at the network ACL months later, I can't figure out who owns the IP Address what what is it...
1
answers
1
votes
36
views
asked 11 days ago
Hi All,
I have just started to learn VPC on AWS. I have a scenario where I launched two private and one public subnets. My expectation is that private instances should connect to internet via NAT gat...
2
answers
0
votes
51
views
asked 11 days ago
Hello everyone,
I’m looking for advice on secure, scalable, and seamless API authorization best practices across multiple cloud platforms.
Here’s the setup:
I have an API Gateway deployed in AWS, pro...
1
answers
0
votes
56
views
asked 12 days ago
My question is I'm having issues these particular place called key pair after creating it successful when I want to install it then it's will showing not installed and I have tried several times think...
1
answers
0
votes
39
views
asked 13 days ago
Good morning everyone;
I created a VPN with two subnets, a private one with an EC2 instance (protected by Security Group) and a public one with a NAT GTW and IGW. In the private subnet, in the NACL s...
2
answers
0
votes
99
views
asked 24 days ago
What is the best tool to identify resources an IAM role has access to but doesn't use/ need.
I attempted using Last accessed/ CloudTrail lake / Cloudtrail API
But none of these worked for various ...
1
answers
0
votes
58
views
asked a month ago
Two days ago we stopped receiving notifications from our Gravity Forms contact form on WordPress. We've confirmed with Gravity that the notifications are being handed over the mail server successfully...
1
answers
-1
votes
52
views
asked a month ago