Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Alice Young
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Very informative. Thanks!
On
Reviewing implemented solutions to ensure security at every layer
Looking forward to more posts like this.
On
Authentication methods (password-based, certificate-based, and role-based)
How do you handle large datasets when visualizing data in AWS?
On
How to visualize data for analysis
Solid advice on managing log lifecycles. Good read!
On
Log destinations and lifecycle management (for example, retention period)
This is an excellent resource for understanding how to meet compliance requirements using network encryption.
On
Implementing network encryption methods to meet application compliance requirements (for example, IPsec, TLS)
This post is quite informative. I'm curious about integrating third-party backup solutions with AWS.
On
Architecting a backup solution that is automated, is cost-effective, and supports business continuity across multiple Availability Zones or Regions
I've been using Splunk for log analysis. Does anyone have experience integrating it with AWS services?
On
Analyzing logs, metrics, and security findings
In my opinion, federated identity is an essential concept for modern cloud security.
On
Understanding the types of identity management (for example, federated)
Is there a way to automate alerts for specific thresholds in AWS CloudWatch?
On
Logging and monitoring systems
Search for: