Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Tom Josdal
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
I appreciate the blog post, it was very informative.
On
Designing mechanisms to prevent unauthorized public access (for example, S3 Block Public Access, prevention of public snapshots and public AMIs)
Just cleared the SAP-C02 exam! Insights like these were super useful.
On
Designing billing alarms based on expected usage patterns
Does anyone know if there's a way to automate DNS logging setup using CloudFormation?
On
Configuring DNS monitoring and logging on Route 53
Great post! Really appreciated the practical examples.
On
Techniques for root cause analysis
Intrigued by the intersection of event-driven networking and machine learning mentioned here. Can anyone elaborate?
On
Integrating event-driven networking functions
Great post, clarified a lot of my doubts!
On
Designing network flows to keep data off the public internet (for example, by using Transit Gateway, VPC endpoints, and Lambda in VPCs)
Great job! Thanks for sharing this.
On
Identifying and remediating single points of failure in existing workloads
Great blog post! Just wondering, how can we use CloudTrail logs to pinpoint the cause of authorization errors?
On
Analyzing access or authorization errors to determine cause or effect
Good compilation of information. Helped a lot!
On
Containers (for example, Amazon ECS, Amazon EKS, Fargate)
Great insights on attack mitigation strategies!
On
Developing attack mitigation strategies for large-scale web applications
load more comments
Search for:
x