Resolve Issues with Potentially
Change your AWS root account password and the passwords of any IAM users
It’s a best practice to change your passwords on a regular basis to avoid unauthorized use of your account. For more information, see the AWS Security Best Practices whitepaper.
Delete or rotate all AWS access keys and IAM users
If you find AWS access keys that you no longer need or didn’t create, delete the access key.
If your application currently uses an access key, replace the key with a new one:
- Create a second key and modify your application to use the new key.
- If there are any problems with your application, reactivate the key temporarily. When your application is fully functional and the first key is in the disabled
Treat AWS access keys the same way you would treat an account password:
- Don’t provide access keys to anyone you don’t know and trust.
- Don’t publish access keys to public websites or code repositories.
For AWS security best practices, see the AWS Security Best Practices whitepaper.
Delete any unrecognized or unauthorized resources
Sign in to your AWS account and check that all the resources on your account are resources that you launched. Make sure to check all AWS Regions, even regions in which you’ve never launched AWS resources. Pay special attention to the following:
If you’re not sure how to delete a resource associated with a particular AWS service, find the service's documentation at AWS Documentation.
Contact AWS Support
If you received correspondence from AWS about potential issues with your account, sign in to the AWS Support Center and respond to the notification with any information AWS Support requested from you.
If you can't sign in to your account, use the Contact Us form to request help from AWS Support.
If you have any additional questions or concerns, but didn’t receive a notification, create a new AWS support case in the AWS Support Center.
Note: Do not include potentially sensitive information in your correspondence, including full AWS access keys, passwords, or credit card information.
Use AWS Git projects to scan for evidence of compromise
AWS offers Git projects you can install that can help you protect your account:
- Git Secrets can scan merges, commits, and commit messages for secret information (e.g. access keys). If it detects prohibited regular expressions, it can reject those commits from being posted to public repositories.
- The AWS Health and AWS Trusted Advisor Exposed Keys CloudWatch Event Monitor can help you use AWS Step Functions and AWS Lambda to generate Amazon CloudWatch Events from AWS Health or by Trusted Advisor. If there is evidence that your access keys have been compromised, the projects can help you automatically detect, log, and mitigate the event.
相關推薦
Resolve Issues with Potentially
Change your AWS root account password and the passwords of any IAM users It’s a best practice to change your
Resolve Issues with Limits for ENIs
Amazon Web Services is Hiring. Amazon Web Services (AWS) is a dynamic, growing business unit within Amazon.com. We are currently hiring So
Resolve Issues With Docker Expanding the Thin Pool
Docker attempts to automatically expand its thin pool but fails with the message "Insufficient free space" or "Failed to extend thin docker-doc
Resolve Issues with the AWS Activate Business Support Plan
Amazon Web Services is Hiring. Amazon Web Services (AWS) is a dynamic, growing business unit within Amazon.com. We are currently hiring So
Resolve Issues with RDS Instances in the Failed State
The failed state for RDS DB instances usually indicates that the hardware associated with your RDS DB instance failed, and that AWS wasn’t able
Resolve Issues with Failing Stack Updates After Deleting CloudFormation Resources
You might be able to re-create a resource that is created manually by name. For example, IAM roles are tracked by name. If you accidentally de
Resolve Issues with Throttled DynamoDB Tables
Partitions are usually throttled when they are accessed by your downstream applications much more frequently than other partitions (that is, a
Resolve Issues with Redshift Queries Exceeding WLM Timeouts
A query hopped to another queue If a read query reaches the timeout limit for its current WLM queue or there is a query monitoring
Resolve Issues with Corrupt or Missing Network Drivers on Windows EC2 Instances
reg load HKLM\AWSTempSoftware D:\Windows\System32\config\SOFTWARE reg add HKLM\AWSTempSoftware\Microsoft\Windows\CurrentVersion\RunOnce /t REG_S
Resolve Issues With Amazon Athena Queries Returning Empty Results
Here are some common reasons why the query might return zero records. File selected in crawler settings If you're using a
Resolve Issues with CloudWatch GetMetricStatistics API Call Not Returning Data Points
Period If the metric isn't pushed for the specified period value, no data points are returned. For example, if you enable
Resolve Intermittent Connection Issues With NAT Instances
Amazon Web Services is Hiring. Amazon Web Services (AWS) is a dynamic, growing business unit within Amazon.com. We are currently hiring So
Could not resolve view with name '***' in servlet with name 'dispatcher'
urn 異常 避免 href 出現 view hist 異步 rop 今天在開發中遇到了一個問題,控制層使用的是SpringMVC框架。 @RequestMapping("historyDetail") private String History(Mod
SpringBoot內建SpringMVC控制器轉發到對應的JSP頁面報Could not resolve view with name 'xx' in servlet with name dispa
錯誤如下: 請求: 處理方式: 在主啟動類中增加一下程式碼即可解決問題: @Bean public InternalResourceViewResolver setupViewResolver(){ InternalResourceViewResolver res
Navigant Research Publishes Report on Key Issues with Autonomous Vehicle Data
The autonomous systems piloting self-driving cars will make decisions that have life-and-death consequences. There is little room for error in their abilit
啟動hadoop時報錯ssh: Could not resolve hostname with: Name or service not know
只需把export HADOOP_OPTS=“ H A D
【error】HTTP Status 500 - Could not resolve view with name 'xxx' in servlet
HTTP Status 500 - Could not resolve view with name 'xxx' in servlet with name 'springmvc' type Exception report message Could not resolve view with n
Troubleshoot Issues with CloudHSM Classic using Logs
Collect syslogs from your CloudHSM appliance The HSM appliance generates logs that can be exported via syslog. Syslogs can be used t
Troubleshoot SMTP Connectivity or Timeout Issues with Amazon SES
2. Note the output. 3. If the connection times out, check your local firewall rules, routes, and access control lists (ACLs).
Resolve Issues Booting G2 Series RHEL EC2 Instances
Amazon Web Services is Hiring. Amazon Web Services (AWS) is a dynamic, growing business unit within Amazon.com. We are currently hiring So