Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Christina Hudson
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
How do we ensure that our AWS resources are not over-permissioned?
On
Analyzing the service functionality, permissions, and configuration of resources after an event that did not provide visibility or alerting
I find metric math very powerful. Anyone else using it?
On
Defining the metrics and thresholds that generate alerts
Can you automate acceptance tests as part of the AWS CodePipeline?
On
Different types of tests (for example, unit tests, integration tests, acceptance tests, user interface tests, security scans)
Would love a follow-up post on advanced security configurations.
On
Configuring integrations with native AWS services and third-party services (for example, by using Amazon EventBridge and the ASFF)
Do policy-based and tag-based methods have any security drawbacks?
On
Authorization methods (role-based, policy-based, tag-based, and attributebased)
Appreciate the detail around Network Firewall, really useful!
On
Securing inbound traffic flows into AWS (for example, AWS WAF, AWS Shield, Network Firewall)
How often should disaster recovery tests be conducted?
On
Performing disaster recovery testing
A big thanks for such a well-structured post!
On
Artifact use cases and secure management
I believe the examples in the tutorial were a bit too basic.
On
Appropriate metrics for scaling services
Is there a significant difference between AWS-owned keys and customer-managed keys?
On
Deploying encryption strategies for data at rest and data in transit
load more comments
Search for:
x