Questions tagged with Security
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
AWS and IP spoofinglg...
Hey everyone, I use Cloudflare as my WAF, and host my server on AWS and I was wondering, and I want to only whitelist IPs relating to Cloudflare, but I have a problem... how does AWS handle IP...
3
answers
0
votes
599
views
asked 3 months agolg...
All,
How can I disable the upload of a file from AWS Workspace to any internet email such as Gmail, Drive, Dropbox, or any external web?
I need to allow downloads from the internet to AWS Workspace...
4
answers
0
votes
280
views
asked 3 months agolg...
We currently use EC2 full access, S3 full access, & elastic load balancing full access to get terraform up and running. These permissions are turned on and off after every terraform build. This is a...
3
answers
0
votes
259
views
asked 3 months agolg...
```
Denial of Service Vulnerability in DNS servers (KeyTrap+ NSEC3)
Indian - Computer Emergency Response Team (cert-in.org.in)
Severity Rating: High
Overview
Two vulnerabilities have been reported in...
1
answers
0
votes
183
views
asked 3 months agolg...
Good morning,
We have just received the below from AWS regarding one of our Amazon Linux-based webservers. Upon connecting to the host we can't find and evidence of GET command to the Netherlands...
1
answers
0
votes
538
views
asked 4 months agolg...
I am working on a mobile game where the user logs in within the app itself on my own UI. I want to lock down my API Gateway requests to only authenticated users within my Cognito user pool.
1. In...
3
answers
0
votes
221
views
asked 4 months agolg...
For a recent proof of concept I was looking into a way to integrate AppSync, ALB and Cognito and I was wondering if what I did was correct or can be improved as I wasn't able to find a solution "off...
0
answers
0
votes
212
views
asked 4 months agolg...
Came across claims that bedrock calls were HIPPA compliant even with OpenAI traffic, seeking clarification. Generally, medical documents must be sterilized before using public access models such as...
2
answers
0
votes
175
views
asked 4 months agolg...
Hi all,
my credential have been stolen. I changed my account password, but i am affraid that access keys are now in other hands.
I have EC2, RDS and VCP istances up and running. How i can ensure that...
2
answers
0
votes
179
views
asked 4 months agolg...
Hi,
I want to update my private instances with WSUS server, but for that it is required to update GPO , i am not aware on how to do it for AWS managed directory so that it will apply to my domain.
i...
1
answers
0
votes
347
views
asked 4 months agolg...
How to get end user's access-key and secret-access-key
by using accountId and registered email/username w.r.t "amazon s3" in spring boot application ?
1
answers
0
votes
358
views
asked 4 months agolg...
I would like to know how we can implement authorization logic (subscription method) on privatelink connection from the server (VPC endpoint defined in client and VPC EndPoint Service with an ALB...
3
answers
0
votes
143
views
asked 4 months agolg...