Stay up to date with the latest from the Knowledge Center. See all new and updated Knowledge Center articles published in the last month and re:Post’s top contributors.
Security, Identity, & Compliance
Securely run your business with the most flexible and secure cloud computing environment available. Benefit from AWS data centers and a network architected to protect your information, applications, and devices. Meet core security requirements, such as data locality, protection, and confidentiality with our comprehensive services and features.
Recent questions
see all1 / 18
- Hi Engineers, I have a problem verifying my request for aws certificate. I tried DNS verification and it did not work. I then deleted the certificate request and made a new request with an email verif...
- I am building a backend web api aplication with node js/express, and I am having trouble verifying the token. I believe that the issue is that the scope information isn't on the token so I can't verif...
- For context I am following the instructions posted here: https://repost.aws/knowledge-center/network-firewall-set-up-with-nat-gateway 📌 Questions for AWS Support 1️⃣ Why is AWS Network Firewall ...
- I spun up an instance to replace the key-pair on a volume. Instead of spinning up in us-east-1c, it started in 1a. How do I specify the exact availability zone so the volume is eligible for attaching ...
- When attempting to register an IAM Identity Center user's MFA device, only passkey access is provided via a FIDO key. I want that user to be able to authenticate using both a passkey and a 6 digit cod...
- I have a client who is currently set up for SP-initiated SSO with Amazon Cognito, but the client has also requested IdP-initiated SSO. In the past, with other IdPs, we've used the standard RelayState ...
- I am looking for documentation on how to configure SNS sms publish to use a phone number from another account. Using CLI ``` aws pinpoint-sms-voice-v2 describe-phone-numbers --owner SHARED ``` I can ...
- `ClientError: An error occurred (AccessDeniedException) when calling the CreateInferenceComponent operation: User: arn:aws:sts::x:assumed-role/xx-xx-xx-xx-user-service-role/SageMaker is not authorize...
- I am facing issue with Certificate manager. I have entered correct CNAME and VALUE in creating record in Route53, but still Certificate in Certificate Manager is stuck in Pending Validation state from...
- Hello, I'm trying to patch some vulnerabilities detected by AWS Inspector. For example, theres a CVE-2024-34156 and couple of more related to AWS Cloudwatch agent. I've tried manually updating using...
- I want that after user enters the verification code, authenticator does not go back to empty create account view instead refreshes the page so a login check can start... Can i do that simple using l...
- I am using Amplify Gen 2 with cognito. After user creates an account and enteres verification code, i want my app to reload so user automatically logs in... But it just turns back to create account ta...
- I cannot access https://repost.aws/ from a specific IP address, while other IP addresses can access it without any issues. Below is the response I received from my browser:  as default language?
- I am using default authenticator from Amplify (Gen2). When user goes to app there is the authenticator sign in tab, if user does not have the account yet, they switch to "Create Account" Tab manually ...
- https://mvnrepository.com/artifact/com.itextpdf/itextpdf/5.5.13.4 - this doesn't indicate vulnerability. The reference is from the pom.xml file "META-INF/maven/com.itextpdf/itextpdf/pom.xml" inside o...
- I am trying to setup AWS Cognito MFA to access an SMS number in another account. In the other account, I have a phone number and have shared it using RAM with my development account. From my developm...
Recent Knowledge Center content
see all1 / 18
- AWS OFFICIALUpdated 3 months ago
Recent articles
see all1 / 18
- EXPERTpublished 6 days ago0 votes66 viewsYou can now troubleshoot RDS IAM DB authentication issues at your end using these metrics and logs
- EXPERTpublished 16 days ago0 votes95 viewsAt AWS re:Invent 2024, Micah Hausler, Principal Software Engineer, and George John, Senior Product Manager at AWS, presented a session on securing Kubernetes workloads in Amazon Elastic Kubernetes Ser...
- EXPERTpublished a month ago2 votes159 viewsAs legal hold has no expiration date, users may wish to use this mode to apply an indefinite lock on objects they wish to protect from accidental or malicious deletion. In this scenario, it may be des...
- EXPERTpublished a month ago0 votes298 viewsThis article explores AWS security evolution through root access management, MFA integration, and MFA adoption timelines. It provides details on progression from basic to sophisticated security mechan...
- EXPERTpublished a month ago1 votes250 viewsThis blog post summarizes key highlights from the AWS re:Invent 2024 session "Securing Amazon ECS workloads with AWS Signer and Amazon GuardDuty" presented by Mai Nishitani, Senior Solutions Architect...
- EXPERTpublished 2 months ago0 votes203 viewsThis repost focuses on securing Amazon Elastic Kubernetes Service (EKS) clusters using Prowler, an open-source multi-cloud security tool.
- EXPERTpublished 2 months ago0 votes153 viewsProcedure for AWS administrators to resolve S3 bucket lockouts through temporary root sessions, addressing a common operational challenge using AWS' latest IAM security features.
- EXPERTpublished 2 months ago2 votes1.8K viewsIn this article we detail how to detect objects encrypted with SSE-C within an S3 bucket, and provide guidance on scaling this approach
- EXPERTpublished 2 months ago1 votes162 viewsIn April 2024, Amazon Web Services introduced a new feature for Amazon Route 53 called Route 53 Profiles. This article talks about Profiles, its features, and the steps to create a Profile.
- AWS OFFICIALUpdated a month ago1 votes458 viewsThis article is the first part of a series on resilience best practices and key design principles that can minimize business disruptions during outages.
- EXPERTpublished 3 months ago1 votes412 viewsThis guide provides a step-by-step approach to integrating Amazon GuardDuty findings with an on-premises Splunk deployment, enabling security teams to centralize and analyze threat intelligence data f...
- EXPERTpublished 3 months ago0 votes473 viewsNew launch that provides seamless integration between Amazon Security Lake and Amazon OpenSearch Service. This allows you to search and analyze your security data in-place without data integration hur...
- EXPERTpublished 4 months ago1 votes329 viewsIn the event of a security incident or a suspected compromise of an AWS Identity and Access Management (IAM) User/Role or AWS Identity Center (IDC) user, swift isolation of the affected identity is cr...
- EXPERTpublished 4 months ago10 votes415 viewsThis Article talks about activating on-demand EC2 Malware Scanning
- AWS OFFICIALUpdated 4 months ago0 votes1.5K viewsThis article guides you on how to configure your Kubernetes webhook setup and use Amazon Elastic Kubernetes Service (Amazon EKS) to identify webhook failures proactively.
- EXPERTpublished 4 months ago0 votes128 viewsUpgrading Secrets Manager Lambda rotation functions from Python 3.7 to 3.9 or above may cause different dependency errors when the code is executed. Different methods may help to resolve the problem.
- EXPERTpublished 4 months ago0 votes471 viewsThis article demonstrates how to use AWS Secrets Manager with Java applications to securely store and retrieve sensitive information. It covers creating secrets and accessing them using the AWS SDK fo...
- EXPERTpublished 4 months ago0 votes351 viewsThis article aims to assist customers with existing Microsoft Active Directory services, whether deployed in AWS or on-premises, in extending their domain into new AWS region(s)
Recent selections
see all1 / 6
- EXPERTpublished 4 months ago0 votes611 viewsThis spotlight on IAM equips you with the skills and troubleshooting tips to get the most out of a powerful service.
- AWS OFFICIALUpdated 3 days ago6 votes8.4K viewsThe AWS Trust & Safety Center provides curated knowledge of AWS resources that can assist you in your cloud journey.
- EXPERTpublished 10 months ago2 votes18.5K viewsThis selection focuses on the essential AWS networking services, providing a comprehensive overview of tools and technologies available to build and manage secure, scalable, and high-performing networ...
- EXPERTpublished a year ago4 votes27.8K viewsA selection of architectural patterns and tips to leverage secure cross-account APIs, showing ingress, egress and inspection reference architectures
- EXPERTpublished a year ago4 votes11.1K viewsDo you have critical workloads running in AWS? Review these handpicked resources to find ways to ensure your applications are resilient to failures.
- AWS OFFICIALUpdated a year ago0 votes7.7K viewsAre you getting 403 Access Denied errors with your Amazon Simple Storage Service (Amazon S3) operations? Review this list of handpicked resources to identify the root cause and troubleshooting instruc...
1 / 18
Riku_Kobayashi
EXPERTGary Mclean
EXPERTBrettski-AWS
EXPERTsecondabhi_aws
EXPERTOleksii Bebych
EXPERTGreg_B
EXPERTOsvaldo Marte
EXPERTSedat Salman
EXPERTAdeleke Adebowale Julius
EXPERTiBehr
EXPERTTushar_J
EXPERTMatt-B
EXPERTAWS-User-alantam
EXPERTIndranil Banerjee AWS
EXPERTiwasa
EXPERTGanesh Kudikala
EXPERTMassimilianoAWS
EXPERT