Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Eloïse Hubert
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Can someone explain why we need cross-validation in machine learning?
On
Perform cross validation.
This is so detailed and useful. Kudos to the author!
On
Applying IAM solutions for multi-account and complex organization structures (for example, SCPs, assuming roles)
Informative article. Helped me understand subnet optimization!
On
Updating and optimizing subnets for auto scaling configurations to support increased application load
Great post on configuring S3 events with Lambda! It’s very helpful for the DOP-C02 exam.
On
Configuring S3 events to process log files (for example, by using Lambda) and deliver log files to another destination (for example, OpenSearch Service, CloudWatch Logs)
I have been using Parameter Store, should I switch to Secrets Manager?
On
Passing secrets and credentials securely to compute workloads
Is there a way to automate the creation of IAM roles for new services spun up through Auto Scaling?
On
Security configurations (for example, IAM roles and permissions to allow for log collection)
The Route 53 and load balancer integration seemed complex at first, but this article simplified it significantly.
On
Integrations of load balancers and other AWS services (for example, Global Accelerator, CloudFront, AWS WAF, Route 53, Amazon Elastic Kubernetes Service [Amazon EKS], AWS Certificate Manager [ACM])
Can anyone explain how ASFF helps in prioritizing security findings in AWS Security Hub?
On
AWS Security Finding Format (ASFF)
Quick question: Can KMS keys be rotated automatically?
On
Designing mechanisms to protect data integrity by preventing modifications (for example, by using S3 Object Lock, KMS key policies, S3 Glacier Vault Lock, and AWS Backup Vault Lock)
I have a question. Does the tool offer any automated remediation suggestions for the identified gaps?
On
Using the AWS Well-Architected Tool to identify security gaps
load more comments
Search for: