Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Hugo Hernández
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Very informative blog post. What about edge security for mobile app backends?
On
Defining edge security strategies for common use cases (for example, public website, serverless app, mobile app backend)
The AWS Well-Architected Framework is a good resource for understanding best practices.
On
Integrating event-driven networking functions
Impressive walkthrough! Do you recommend any specific naming conventions for Docker images?
On
Automating Amazon EC2 instance and container image build processes (for example, EC2 Image Builder)
Why is centralized logging important in a governance model?
On
Selecting the appropriate governance model
In my opinion, the blog should include more in-depth recovery scenarios.
On
Engineering failure scenario activities to support and exercise an understanding of recovery actions
The disaster recovery strategies mentioned were very helpful. Thanks!
On
Deploying workloads in multiple Regions for global scalability
I appreciate the tips on filtering and searching logs efficiently.
On
Configuring logging for services and applications
Appreciate the breakdown of storage options!
On
AWS storage services (for example, Amazon Elastic Block Store [Amazon EBS], Amazon Elastic File System [Amazon EFS], Amazon FSx, Amazon S3, Volume Gateway)
Is there any overlap between these telemetry sources?
On
Determining which telemetry sources to monitor based on network design, threats, and attacks (for example, load balancer logs, VPC Flow Logs, Traffic Mirroring)
This blog really helped me understand the importance of using multiple layers of security.
On
Combining security controls to apply defense in depth (for example, AWS Certificate Manager [ACM], AWS WAF, AWS Config, AWS Config rules, Security Hub, GuardDuty, security groups, network ACLs, Amazon Detective, Network Firewall)
load more comments
Search for:
x