Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Odarka Bilan
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
The section on using AWS Lambda for automated responses was enlightening.
On
Responding to compromised resources (for example, by isolating Amazon EC2 instances)
Make sure your IAM role has the necessary permissions to publish metrics. The policy should include 'cloudwatch:PutMetricData'.
On
Implementing customized metrics by using CloudWatch
How does cost compare between VPC Peering and Transit Gateway?
On
Connecting multiple VPCs by using the most appropriate services based on requirements (for example, using VPC peering, Transit Gateway, PrivateLink)
Could we see a sample configuration file for KMS key policies?
On
Configuring encryption of log data (for example, AWS KMS)
How do you handle secrets in serverless applications?
On
Evaluating a strategy for the secure management of secrets and credentials
Regarding Elastic Beanstalk: How much control does it offer over the underlying infrastructure?
On
Selecting the appropriate compute platform
Does using AWS Backup service help in achieving good RPO?
On
Disaster recovery concepts (for example, RTO, RPO)
Any tips on using AWS Storage Gateway for hybrid cloud solutions?
On
Performing data transfer modeling and selecting services to reduce data transfer costs
Regularly monitor and log the ETL process to catch any anomalies early.
On
SQL queries (for data source queries and data transformations)
I struggled setting up the custom insights in Security Hub, but this blog cleared it up. Thanks!
On
Configuration of monitoring services (for example, Security Hub)
load more comments
Search for:
x