Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Bethany Cairo
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Verify that your resolver rules are properly set and that the resolver endpoints in AWS are reachable from your on-prem…
On
Configuring existing on-premises name resolution with the AWS Cloud
Does enabling MFA on the root account block access through CLI or SDK?
On
Setting up multi-factor authentication (MFA)
Is there any advantage in using Chef with OpsWorks as opposed to using it standalone?
On
Configuration management services and strategies
How does AWS ensure the security of temporary credentials?
On
Establishing identity through an authentication system, based on requirements
Thank you for this useful tutorial on AWS services!
On
AWS managed services with appropriate use cases (for example, AWS Transfer Family, Amazon Simple Queue Service [Amazon SQS], Secrets Manager)
Great blog! This helped clarify a lot of my doubts about ALB and CloudFront logging.
On
Access logging (for example, load balancers, CloudFront)
Has anyone faced issues with centralized deployment using CodeDeploy?
On
Centralized management, deployment, and versioning of AWS services
Using Lambda for custom anomaly detection scripts is quite powerful.
On
Identifying anomalies based on resource utilization and trends
Some of the content was a bit too high-level. Would appreciate more technical depth.
On
Reviewing comprehensive traceability of users and services
For human access, would you recommend IAM users or groups?
On
Appropriate usage of different IAM entities for human and machine access (for example, users, groups, roles, identity providers, identity-based policies, resource-based policies, session policies)
load more comments
Search for:
x