Stay up to date with the latest from the Knowledge Center. See all new and updated Knowledge Center articles published in the last month and re:Post’s top contributors.
Security, Identity, & Compliance
Securely run your business with the most flexible and secure cloud computing environment available. Benefit from AWS data centers and a network architected to protect your information, applications, and devices. Meet core security requirements, such as data locality, protection, and confidentiality with our comprehensive services and features.
Recent questions
see all1 / 18
- Hello team, Is there a way to track the exact duration of time a file is scanned when using the new AWS GuardDuty Malware Protection for S3 service? From the moment the file is fully uploaded to S3 u...
- We have an API key with the following list of domains set in `AWS WAF`> `Application Integration` > `CAPTCHA Integration` : * `acme.com` * `api.acme.com` (an API Gateway deployment linked with the CA...
- HI team, Is there a way to determine the exact amount of time a file is scanned when using the new AWS GuardDuty Malware Protection for S3 service? i did not find a log group name : AWS/GuardDuty/Ma...
- I want to route requests to HTTP API Gateway B or AppSync HTTP endpoint in account B through HTTP API Gateway A in account A and authorize requests from HTTP API Gateway A to B using IAM.
- Hi, everyone. I'm trying to set up Cognito authentication with phone number OTP verification. During development, I'm trying to add the verified phone number and get an error: `Error code: Authorizati...
- I would like to expose a VPC Lattice service using API Gateway VPC Link. Is there a way to restrict access to the Lattice service to only allow requests from this API Gateway?
- Hello guys, I'm trying to remove a KMS key, and is being return this error: DeleteImportedKeyMaterial request failed AccessDeniedException - User: arn:aws:iam::X:root is not authorized to perform: ...
- I have a Cognito user pool and want to integrate my users into another system. The other system supports SAML, but I haven't found a way to enable Cognito as an IdP. From my research, it seems that Id...
- Hi Is there a way (i.e using RDSADMIN_UTIL package) or workaround to grant these two privileges/roles to an account in oracle RDS? GRANT ANY PRIVILEGE GRANT ANY ROLE I have a pl/sql application tha...
- Let's say there are two accounts in Org 2, Account A and Account B, attached to a Transit Gateway in Org 1 via an Account Resource share in Resource Access Manager (not Org share). Account A and B are...
- I am trying to create a backup of an RDS SQL Server database to s3. Following the instructions, I created the option group for the database and added the option SQLSERVER_BACKUP_RESTORE and added that...
- I'm getting the following error when using the Java AWS SDK 2.x from my ECS container. Here is my error: ``` software.amazon.awssdk.services.s3.model.S3Exception: User: arn:aws:sts::yyyyyy:assumed-r...
- In Amazon Datazone, I am not able to add the members to project, my project is inside a Domain unit, and my IAM user is the OWNER of this project, and even my IAM user is there in the Project Membersh...
- Our team is running a web service with a domain on AWS. We had a message that our certificate was about to expire, so we renewed it on ACM. We renewed my certificate in ACM, but I get an error in brau...
- I have set up OIDC authentication with AWS Cognito and implemented an SPA flow using React with `react-oidc-ts` and `react-oidc-context`. My app uses Google SSO (via Cognito) for authentication. **My...
- Hi Engineers, I have a problem verifying my request for aws certificate. I tried DNS verification and it did not work. I then deleted the certificate request and made a new request with an email verif...
- I am building a backend web api aplication with node js/express, and I am having trouble verifying the token. I believe that the issue is that the scope information isn't on the token so I can't verif...
- For context I am following the instructions posted here: https://repost.aws/knowledge-center/network-firewall-set-up-with-nat-gateway 📌 Questions for AWS Support 1️⃣ Why is AWS Network Firewall ...
Recent Knowledge Center content
see all1 / 18
- AWS OFFICIALUpdated 4 months ago
Recent articles
see all1 / 18
- EXPERTpublished 9 days ago0 votes70 viewsYou can now troubleshoot RDS IAM DB authentication issues at your end using these metrics and logs
- EXPERTpublished 19 days ago0 votes99 viewsAt AWS re:Invent 2024, Micah Hausler, Principal Software Engineer, and George John, Senior Product Manager at AWS, presented a session on securing Kubernetes workloads in Amazon Elastic Kubernetes Ser...
- EXPERTpublished a month ago2 votes161 viewsAs legal hold has no expiration date, users may wish to use this mode to apply an indefinite lock on objects they wish to protect from accidental or malicious deletion. In this scenario, it may be des...
- EXPERTpublished a month ago0 votes305 viewsThis article explores AWS security evolution through root access management, MFA integration, and MFA adoption timelines. It provides details on progression from basic to sophisticated security mechan...
- EXPERTpublished 2 months ago1 votes251 viewsThis blog post summarizes key highlights from the AWS re:Invent 2024 session "Securing Amazon ECS workloads with AWS Signer and Amazon GuardDuty" presented by Mai Nishitani, Senior Solutions Architect...
- EXPERTpublished 2 months ago0 votes206 viewsThis repost focuses on securing Amazon Elastic Kubernetes Service (EKS) clusters using Prowler, an open-source multi-cloud security tool.
- EXPERTpublished 2 months ago0 votes153 viewsProcedure for AWS administrators to resolve S3 bucket lockouts through temporary root sessions, addressing a common operational challenge using AWS' latest IAM security features.
- EXPERTpublished 2 months ago2 votes1.8K viewsIn this article we detail how to detect objects encrypted with SSE-C within an S3 bucket, and provide guidance on scaling this approach
- EXPERTpublished 2 months ago1 votes165 viewsIn April 2024, Amazon Web Services introduced a new feature for Amazon Route 53 called Route 53 Profiles. This article talks about Profiles, its features, and the steps to create a Profile.
- AWS OFFICIALUpdated 2 months ago1 votes470 viewsThis article is the first part of a series on resilience best practices and key design principles that can minimize business disruptions during outages.
- EXPERTpublished 3 months ago1 votes419 viewsThis guide provides a step-by-step approach to integrating Amazon GuardDuty findings with an on-premises Splunk deployment, enabling security teams to centralize and analyze threat intelligence data f...
- EXPERTpublished 4 months ago0 votes478 viewsNew launch that provides seamless integration between Amazon Security Lake and Amazon OpenSearch Service. This allows you to search and analyze your security data in-place without data integration hur...
- EXPERTpublished 4 months ago1 votes329 viewsIn the event of a security incident or a suspected compromise of an AWS Identity and Access Management (IAM) User/Role or AWS Identity Center (IDC) user, swift isolation of the affected identity is cr...
- EXPERTpublished 4 months ago10 votes418 viewsThis Article talks about activating on-demand EC2 Malware Scanning
- AWS OFFICIALUpdated 4 months ago0 votes1.6K viewsThis article guides you on how to configure your Kubernetes webhook setup and use Amazon Elastic Kubernetes Service (Amazon EKS) to identify webhook failures proactively.
- EXPERTpublished 4 months ago0 votes130 viewsUpgrading Secrets Manager Lambda rotation functions from Python 3.7 to 3.9 or above may cause different dependency errors when the code is executed. Different methods may help to resolve the problem.
- EXPERTpublished 4 months ago0 votes494 viewsThis article demonstrates how to use AWS Secrets Manager with Java applications to securely store and retrieve sensitive information. It covers creating secrets and accessing them using the AWS SDK fo...
- EXPERTpublished 4 months ago0 votes353 viewsThis article aims to assist customers with existing Microsoft Active Directory services, whether deployed in AWS or on-premises, in extending their domain into new AWS region(s)
Recent selections
see all1 / 6
- EXPERTpublished 4 months ago0 votes627 viewsThis spotlight on IAM equips you with the skills and troubleshooting tips to get the most out of a powerful service.
- AWS OFFICIALUpdated 6 days ago6 votes8.6K viewsThe AWS Trust & Safety Center provides curated knowledge of AWS resources that can assist you in your cloud journey.
- EXPERTpublished 10 months ago2 votes18.5K viewsThis selection focuses on the essential AWS networking services, providing a comprehensive overview of tools and technologies available to build and manage secure, scalable, and high-performing networ...
- EXPERTpublished a year ago4 votes27.8K viewsA selection of architectural patterns and tips to leverage secure cross-account APIs, showing ingress, egress and inspection reference architectures
- EXPERTpublished a year ago4 votes11.1K viewsDo you have critical workloads running in AWS? Review these handpicked resources to find ways to ensure your applications are resilient to failures.
- AWS OFFICIALUpdated a year ago0 votes7.7K viewsAre you getting 403 Access Denied errors with your Amazon Simple Storage Service (Amazon S3) operations? Review this list of handpicked resources to identify the root cause and troubleshooting instruc...
1 / 18
Riku_Kobayashi
EXPERTGary Mclean
EXPERTBrettski-AWS
EXPERTsecondabhi_aws
EXPERTOleksii Bebych
EXPERTGreg_B
EXPERTOsvaldo Marte
EXPERTSedat Salman
EXPERTAdeleke Adebowale Julius
EXPERTiBehr
EXPERTTushar_J
EXPERTMatt-B
EXPERTAWS-User-alantam
EXPERTIndranil Banerjee AWS
EXPERTiwasa
EXPERTGanesh Kudikala
EXPERTMassimilianoAWS
EXPERT