Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Brigitte Fournier
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Appreciate the blog post, it clarified a lot of concepts!
On
Security telemetry sources (for example, Traffic Mirroring, VPC Flow Logs)
Enjoyed the blog post. AWS Identity and Access Management is more streamlined than ever.
On
AWS security, identity, and compliance tools (for example, AWS CloudTrail, AWS Identity and Access Management Access Analyzer, AWS Security Hub, Amazon Inspector)
It was not detailed enough for advanced users.
On
Using CloudFormation to deploy cloud resources consistently and securely
Appreciate all the expert inputs here!
On
Determining redundancy and security workload requirements for communication between on-premises environments and the AWS Cloud (for example, by using AWS VPN, AWS VPN over Direct Connect, and MACsec)
This tutorial was really helpful in understanding availability zones in AWS.
On
Recognizing that Availability Zones do not share single points of failure
Can someone explain the auditing capabilities between AWS managed and customer managed keys?
On
Differences between AWS managed and customer managed AWS Key Management Service (AWS KMS) keys
Thank you! This was very informative.
On
Amazon CloudWatch metrics, agents, logs, alarms, dashboards, and insights in AWS architectures to provide visibility
Appreciate the clarity and simplicity in this blog!
On
Deployment methodologies for various platforms (for example, Amazon EC2, Amazon Elastic Container Service [Amazon ECS], Amazon Elastic Kubernetes Service [Amazon EKS], Lambda)
How do you differentiate between legitimate traffic and potential attacks in VPC Flow Logs?
On
How to read relevant log sources (for example, Route 53 logs, AWS WAF logs, VPC Flow Logs)
Can cost allocation tags be used to monitor AWS Lambda costs?
On
Implement cost allocation tags.
Search for:
x