Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
David Johnson
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
How does a Service Mesh architecture influence the threat model?
On
Different threat models based on application architecture
Appreciate the examples given in the blog post. They made the concept much easier to understand.
On
Enforcing proper separation of duties
Perfectly explained, thanks!
On
Configuring DNS monitoring and logging on Route 53
Do VPC endpoints impact network latency?
On
Network segmentation (for example, subnetting, IP addressing, connectivity among VPCs)
This was somewhat helpful, but the topic on cost management could be elaborated more.
On
Perform load balancing.
In my opinion, the tutorial missed discussing AWS Security Hub integration.
On
Creating hardened EC2 AMIs
I think there should be more examples on integrating with third-party services.
On
Evaluating logging and monitoring services for alignment with security requirements
Can someone suggest how to implement the least privilege principle in AWS Lambda?
On
Principle of least privilege as it applies to AWS security
Does CRR handle versioned objects?
On
Configure Amazon S3 Cross-Region Replication (CRR).
For anyone studying for the SOA-C02 exam, hands-on practice is crucial.
On
Validate service control policies (SCPs) and permissions boundaries.
load more comments
Search for: