Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Abigail Myers
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
We encountered high costs using EC2 Image Builder for frequent AMI creation. Tips to optimize?
On
Tools and services available for distributing code (for example, CodeDeploy, EC2 Image Builder)
How does AWS CodeDeploy support both mutable and immutable deployment strategies?
On
Mutable deployment patterns in contrast to immutable deployment patterns
VPC peering is very important for enabling network communication between different VPCs and is crucial for a secure architecture.
On
VPC security networking concepts
Another option is to use AWS Security Hub for aggregating and summarizing security findings from CloudTrail logs across multiple accounts.
On
Correlating and analyzing information across single or multiple AWS log sources
Could you elaborate on using AWS Directory Service with IAM Identity Center?
On
Identity federation techniques (for example, using IAM identity providers and AWS IAM Identity Center [AWS Single Sign-On])
The troubleshooting checklist for authorization errors was spot on.
On
Analyzing access or authorization errors to determine cause or effect
Great post on change management processes for IaC-based platforms! Extremely helpful for preparing for the AWS DevOps Engineer exam.
On
Change management processes for IaC-based platforms
Do not forget to regularly audit your ACLs to ensure they are providing the intended security.
On
Implementing a network audit strategy across single or multiple AWS network services and accounts (for example, Firewall Manager, security groups, network ACLs)
Fantastic article, cleared up a lot of questions!
On
Disaster recovery (DR) strategies (for example, backup and restore, pilot light, warm standby, active-active failover, recovery point objective [RPO], recovery time objective [RTO])
I think the post could have provided a bit more detail on incident response strategies.
On
Developing a threat model and identifying appropriate mitigation strategies for a given network architecture
load more comments
Search for: