Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
مهراد کریمی
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Can anyone elaborate on the best practices for securing PrivateLink endpoints?
On
Maintaining private access to custom services (for example, PrivateLink, VPC peering)
Used the techniques outlined here to solve a problem at work today. They're applicable in real-world scenarios too!
On
Techniques for root cause analysis
Excellent post! Can someone highlight the differences between cross-account roles and federated access?
On
Cross-account roles
Appreciate the detailed explanation on AWS Site-to-Site VPN.
On
AWS networking services and DNS (for example, Direct Connect, AWS Site-to-Site VPN, Route 53)
Superb article, thanks for explaining Traffic Mirroring in such a simple way.
On
Creating and analyzing network traffic mirroring (for example, using VPC Traffic Mirroring)
I find IAM policies more flexible compared to resource policies. Anyone else?
On
Resource policies (for example, for DynamoDB, Amazon S3, and AWS Key Management Service [AWS KMS])
Thank you, fantastic article!
On
Monitoring tool sets and services (for example, CloudWatch)
I agree! Snapshots can provide a point-in-time backup of the EBS volumes.
On
Capturing relevant forensics data from a compromised resource (for example, Amazon Elastic Block Store [Amazon EBS] volume snapshots, memory dump)
I found a typo in the second paragraph.
On
Automating credential rotation for machine identities (for example, Secrets Manager)
How do I maintain compliance while using AWS services?
On
AWS Well-Architected Framework
load more comments
Search for: