Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Astrid Thomsen
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Big thank you for this blog, truly valuable content!
On
Translating business requirements to measurable metrics
When evaluating risks, how important is it to consider user behavior analytics?
On
Selecting appropriate protections based on anticipated vulnerabilities and risks (for example, vulnerable software, applications, libraries)
Does the choice of load balancer affect scalability?
On
Selecting an appropriate load balancer based on the use case
I didn't understand the part about PKI in the post. Can someone explain?
On
Authentication methods (password-based, certificate-based, and role-based)
How often should we rotate AWS access keys for best security?
On
Managing permissions to control access to human and machine identities (for example, enabling multi-factor authentication [MFA], AWS Security Token Service [AWS STS], IAM profiles)
Anyone else finding the AWS Certified Solutions Architect - Professional exam tough? This post is a godsend.
On
Using service endpoints for service integrations
I've implemented an EventBridge rule that triggers a Lambda function for real-time security alerting. Works like a charm!
On
Automating remediation by using AWS services (for example, AWS Lambda, AWS Step Functions, EventBridge, AWS Systems Manager runbooks, Security Hub, AWS Config)
This helped me ace my exam prep. Thanks a bunch!
On
Configuration of monitoring services (for example, Security Hub)
Amazon EFS is perfect for shared storage among multiple EC2 instances.
On
AWS storage services (for example, Amazon S3, Amazon EFS)
I'm a bit confused about the difference between AWS Shield Standard and AWS Shield Advanced.
On
Security features on edge services (for example, AWS WAF, load balancers, Amazon Route 53, Amazon CloudFront, AWS Shield)
load more comments
Search for: