Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
درسا حسینی
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Misconfigurations like mismatched encryption algorithms, incorrect pre-shared keys, and firewall rules not allowing IPsec traffic are common issues.
On
Encryption methods for data in transit (for example, IPsec)
This blog is an eye-opener for AWS IAM policy management.
On
Different IAM policies (for example, managed policies, inline policies, identity-based policies, resource-based policies, session control policies)
I'm curious about AWS PrivateLink. Can it replace VPC Peering entirely?
On
Different connectivity patterns and use cases (for example, VPC peering, Transit Gateway, AWS PrivateLink)
Can tags help in managing and auditing IAM policies effectively?
On
Specifying IAM users and IAM roles that adhere to the principle of least privilege access
The information provided is pretty basic. Adding some advanced use cases would be beneficial.
On
Amazon CloudWatch metrics (for example, namespaces, metrics, dimensions, and resolution)
Not sure if I missed it, but are there any tips for optimizing Security Hub costs?
On
Configuration of monitoring services (for example, Security Hub)
Hey, does anyone have any experience with AWS DataSync? Is it cost-effective?
On
Performing data transfer modeling and selecting services to reduce data transfer costs
Excellent breakdown of the methodology!
On
Developing a process methodology for selecting purpose-built services for required tasks
I think there could be more discussion on handling secrets securely in CloudFormation.
On
Deployment best practices with infrastructure as code (IaC) (for example, AWS CloudFormation template hardening and drift detection)
Can someone explain the differences between S3 and Glacier for long-term storage?
On
How to determine the appropriate storage solution for specific access patterns
load more comments
Search for: