Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Benito Quispel
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
What role does IAM play in securing large-scale applications?
On
Developing attack mitigation strategies for large-scale web applications
I tried adding a secondary CIDR block but ended up with IP conflicts. Any ideas?
On
Updating and optimizing subnets to prevent the depletion of available IP addresses within a VPC (for example, secondary CIDR)
I found this post very enlightening, especially the part about using ELB and Auto Scaling.
On
Identifying and remediating single points of failure in existing workloads
Thanks a lot! This post answered many of my questions.
On
Implementing network encryption methods to meet application compliance requirements (for example, IPsec, TLS)
Great post! Git and AWS CodeCommit are essentials for modern development.
On
Git-based version control tools (for example, Git, AWS CodeCommit)
How relevant do you think multi-AZ deployments are for handling failure in AWS?
On
Implementing architectures to automatically recover from failure
Is there any automated way to check for conflicting CloudFormation stacks before deployment?
On
Determining when and how to deploy AWS Control Tower (for example, which services must be deactivated for successful deployment)
The comparison between ZIP files, container images, and lambda layers was very insightful.
On
Lambda deployment packaging options
Just a quick thank you for the detailed comparison.
On
Differences between AWS managed and customer managed AWS Key Management Service (AWS KMS) keys
This could use more examples of real-world applications for each authentication method.
On
Authentication methods (password-based, certificate-based, and role-based)
load more comments
Search for: