Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Aatu Halonen
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Great post on investigating unintended permissions in AWS! This is a critical area for securing resources.
On
Investigating unintended permissions, authorization, or privileges granted to a resource, service, or entity
AWS Cost and Usage Reports are very detailed, but how can we effectively use them in asset planning?
On
Asset planning
Very informative, thank you!
On
Common CloudWatch metrics and logs (for example, CPU utilization with Amazon EC2, queue length with Amazon RDS, 5xx errors with an Application Load Balancer [ALB])
What’s the difference between a Local Zone and an Outpost?
On
AWS Global Infrastructure
Does anyone have experience with automating configuration changes using CloudFormation?
On
Applying configuration changes to systems
Great insights here, much appreciated!
On
How to appropriately use edge accelerators (for example, content delivery network [CDN])
Appreciate the blog post!
On
Describing relationships among Regions, Availability Zones, and edge locations
Great insights, this will certainly help in my SCS-C02 preparations!
On
Evaluating findings from security services (for example, GuardDuty, Security Hub, Macie, AWS Config, IAM Access Analyzer)
Great blog post! Really helpful for preparing for the AWS Certified Solutions Architect exam.
On
Remediating single points of failure
I appreciate the blog but found the section on asymmetric keys lacking in detail.
On
Encryption keys and certificate management (for example, AWS Key Management Service [AWS KMS], AWS Certificate Manager [ACM])
load more comments
Search for:
x