Questions tagged with Security
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
### The direction of access control I want is as follows.
1. Make certain users accessible only to certain DBs
2. Can see what privileges a particular user has on a particular DB (Select, insert,...
2
answers
0
votes
189
views
asked 8 months agolg...
I have created a new OpenSearch collection with network access Policy as Public and created a data access policy with an IAM user. Using this IAM user, I am able to create/access/query indices from...
0
answers
0
votes
77
views
asked 8 months agolg...
Hi AWS Community,
Recently, I encountered a distressing issue with AWS Support. My AWS account was placed under verification, and during this period, all my access and privileges were revoked until I...
0
answers
0
votes
86
views
asked 8 months agolg...
I would like to monitor the volume of data sent externally from my AWS account.
I'm looking for to retrieve logs that allow me to have the volume of data sent externally in real time.
Who can help me...
1
answers
0
votes
373
views
asked 8 months agolg...
I've configured a VPN endpoint with Federated authentication using Azure as the SAML provider. However, I'm facing an issue with the Authorization rules. When I choose "Allow access to users in a...
1
answers
0
votes
317
views
asked 8 months agolg...
I’m currently working on an app using AWS Amplify, and I’ve got a set of APIs that I want to enhance security measures. I’m wondering if there’s a practical way to achieve this through the CLI, or in...
1
answers
0
votes
186
views
asked 8 months agolg...
I'm trying to connect to a SQL Server 2019 instance (happens to be in an EC2) from a C# .NET AWS lambda. I'm using a self-signed certificate to establish client trust with the SQL instance.
There...
1
answers
0
votes
940
views
asked 8 months agolg...
Hi community,
We have a web-based application running in standard n-tier architecture (EC2 instance web server, EC2 instance DB server, application/network load balancers etc) with authentication...
1
answers
0
votes
265
views
asked 8 months agolg...
I have an RSA 2048 private key in the following format:
-----BEGIN PRIVATE KEY-----
<Key Content>
-----END PRIVATE KEY-----
I tried to import this to KMS using the RSA_AES_KEY_WRAP_SHA_256 Algorithm....
2
answers
0
votes
367
views
asked 8 months agolg...
Our external IP is blocked from accessing our S3 AWS. we are not blocking it via an AWS WAF or network rule. It looks like AWS is blocking it from accessing all of AWS. How do we check if its on an...
2
answers
0
votes
285
views
asked 8 months agolg...
We log into our containers from time to time using execute-command and notice that all our activities get logged directly to CloudWatch.
Is there any way to stop your activity logs from going to...
2
answers
0
votes
482
views
asked 8 months agolg...
![Current setup](/media/postImages/original/IMW-Me1zMJQlWUnvqmfmKbYg)
Currently I have a tunnel connection on my sonicwall firewall that I set up that uses a site to site connection to connect the X0...
1
answers
0
votes
211
views
asked 8 months agolg...