Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Judith Rodríquez
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Appreciated the breakdown of various AWS services in the context of user traceability.
On
Reviewing comprehensive traceability of users and services
Ensure that you are using VPC flow logs and enable encryption to mitigate risks.
On
AWS Transit Gateway Network Manager in architectures to provide visibility
Don't forget about AWS Key Management Service (KMS) for managing encryption keys.
On
Data classification based on requirements
Thanks for sharing such a comprehensive guide on CloudWatch!
On
Amazon CloudWatch metrics (for example, namespaces, metrics, dimensions, and resolution)
Appreciate the post! This is exactly what I needed to better understand AWS cost management for my certification.
On
AWS cost and usage for anomaly identification
One of the better resources I've found for AWS Certified Solutions Architect - Professional prep. Thanks!
On
Using processes and components for centralized monitoring to proactively recover from system failures
Amazing read! The way network segmentation was explained is commendable.
On
Implementing an AWS network architecture to meet security and compliance requirements (for example, untrusted network, perimeter VPC, three-tier architecture)
Some examples were too complex for beginners.
On
Analyzing access or authorization errors to determine cause or effect
Some errors were found in setting up my permissions; how can I resolve them?
On
Identifying misconfiguration and determining remediation steps for absent access permissions that are necessary for logging (for example, by managing read/write permissions, S3 bucket permissions, public access, and integrity)
Do automated tests cover all edge cases effectively?
On
Automated software testing (for example, unit testing, mock testing)
load more comments
Search for:
x