Questions tagged with Security
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
Amazon "great" AI decided that my account was hacked and blocked the access. Then they confirmed that it was a mistake and claimed they have removed the restriction, but they did not.
Looks like...
1
answers
0
votes
119
views
asked 8 months agolg...
After linking a CodeCatalyst space to a AWS account, the account becomes responsible for all costs caused by the space. From the documentation, this seems like a de facto cart blanche. How to limit...
1
answers
0
votes
212
views
asked 8 months agolg...
Hi,
My question is regarding the access/resource-based policy you set on OpenSearch domain versus the identity-based policy that e.g., is attached to a Lambda's execution role.
I want to control...
1
answers
0
votes
469
views
asked 8 months agolg...
I have created an SFTP server using the AWS Tranfer family.
The identity provider is (The custom IDentity provider) that will use the lambda function to check with the AWS Secrets manager the password...
1
answers
0
votes
902
views
asked 8 months agolg...
The current environment has also built both ECSCluster Fargate and Container types with Fargate.
To improve container security, we would like to create a user other than Root privileges and run the...
1
answers
0
votes
229
views
asked 8 months agolg...
Hello.
I am implementing Controls (guardrails) with Control Tower. Per example I have enabled "Disallow Actions as a Root User" in ine OU, so when I try to do something with root user, it is no...
1
answers
0
votes
379
views
asked 8 months agolg...
I need to add multiple rules to a new security group, around 130 rules to be specific, spread across 7 port ranges. These rules are already in IP ranges and ports are in ranges too, hence I cannot use...
2
answers
0
votes
920
views
asked 8 months agolg...
IP address unique?lg...
Hi,
Apologies in advance for what is a really basic question.
Our website is hosted in AWS, but I've been asked to confirm whether our website IP address is solely assigned to our website, and...
2
answers
0
votes
236
views
asked 8 months agolg...
### The direction of access control I want is as follows.
1. Make certain users accessible only to certain DBs
2. Can see what privileges a particular user has on a particular DB (Select, insert,...
2
answers
0
votes
191
views
asked 8 months agolg...
I have created a new OpenSearch collection with network access Policy as Public and created a data access policy with an IAM user. Using this IAM user, I am able to create/access/query indices from...
0
answers
0
votes
77
views
asked 8 months agolg...
Hi AWS Community,
Recently, I encountered a distressing issue with AWS Support. My AWS account was placed under verification, and during this period, all my access and privileges were revoked until I...
0
answers
0
votes
88
views
asked 8 months agolg...
I would like to monitor the volume of data sent externally from my AWS account.
I'm looking for to retrieve logs that allow me to have the volume of data sent externally in real time.
Who can help me...
1
answers
0
votes
378
views
asked 8 months agolg...