Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Elif Kutlay
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Stateful transactions can expose more vulnerabilities because they involve maintaining sensitive state information. Stateless transactions can be more secure as…
On
Stateful and stateless data transactions
Awesome read! I finally understand how to map our network topology effectively.
On
Mapping or understanding network topology (for example, Transit Gateway Network Manager)
Transit Gateway seems great but the pricing is quite high. Thoughts?
On
Connectivity methods for AWS and hybrid networks (for example, Direct Connect gateway, Transit Gateway, VIFs)
Could you elaborate on the use of Security Groups and NACLs for securing application flows?
On
Mechanisms to secure different application flows
The choice of AWS services for event-driven architecture is crucial. EventBridge seems to be the centerpiece. Can someone confirm this?
On
AWS services that generate, capture, and process events (for example, AWS Health, EventBridge, CloudTrail)
Excellent insights into AWS services. I would recommend also looking into AWS Firewall Manager for centralized management.
On
Selecting appropriate edge services based on anticipated threats and attacks (for example, OWASP Top 10, DDoS)
Any thoughts on handling patching during peak hours?
On
Applying patches across a fleet of EC2 instances or container images
For securing S3 buckets, apart from bucket policies, what else can we do?
On
Application configuration and credentials security
Great post! It cleared a lot of my doubts regarding container orchestration on AWS.
On
Container images
What is the best practice for tagging resources for compliance?
On
Recognizing services that aid in governance and compliance (for example, monitoring with Amazon CloudWatch; auditing with AWS CloudTrail, AWS Audit Manager, and AWS Config; reporting with access reports)
load more comments
Search for: