Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Isabelle Thompson
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Can anyone explain how AWS Network Manager assists in connectivity validation?
On
Testing and validating connectivity between environments
Well done on the article, appreciated.
On
Scaling factors for load balancers
Some of the content felt a bit too introductory. A deeper dive would be helpful for those already somewhat familiar…
On
Orchestrate data ingestion pipelines (batch-based ML workloads and streaming-based ML workloads) – Amazon Kinesis , Amazon Kinesis Data Firehose , Amazon EMR , AWS Glue , Amazon Managed Service for Apache Flink
Thanks for shedding light on such a critical topic!
On
Passing secrets and credentials securely to compute workloads
Is it necessary to use AWS Config for compliance monitoring?
On
Analyzing architectures to identify monitoring requirements and sources of data for security monitoring
The role of the AWS Trust and Safety team seems really crucial for maintaining a secure cloud environment.
On
Identifying the role of the AWS Trust and Safety team to report abuse of AWS resources
This is very helpful information for anyone preparing for the DevOps certification.
On
Security configurations (for example, IAM roles and permissions to allow for log collection)
I appreciate the detailed explanation on encryption practices in AWS. It's crucial for organizations to prioritize data security in the…
On
Common cloud security threats (for example, insecure web traffic, exposed AWS access keys, S3 buckets with public access enabled or encryption disabled)
Can S3 be used for transactional workloads?
On
Cloud storage options (for example, file, object, databases)
Great post! Designing KMS key policies is crucial for securing AWS environments.
On
Designing KMS key policies to limit key usage to authorized users
load more comments
Search for: