Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Karla Larsen
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Yes, I use flow logs for security monitoring. It's effective for identifying unusual traffic patterns, which can be a sign…
On
Flow logs and traffic mirroring in architectures to provide visibility
Great post! Can anyone explain the difference between AWS WAF and AWS Shield?
On
Configure AWS network protection services (for example, AWS WAF, AWS Shield).
Setting up proper alerts beforehand can prevent visibility issues.
On
Analyzing the service functionality, permissions, and configuration of resources after an event that did not provide visibility or alerting
Great post! Can anyone explain how Amazon CloudFront handles edge location failover?
On
Design patterns for the usage of content distribution networks (for example, Amazon CloudFront)
Having issues with setting up CloudWatch Log streams. Any advice?
On
Configuring service and application logging (for example, CloudTrail, CloudWatch Logs)
Thanks for this informative blog on AWS Certified Security - Specialty. It really helped me understand access and authorization errors…
On
Analyzing access or authorization errors to determine cause or effect
Could you also cover some practical examples of automated responses in future posts? Thanks!
On
Prioritizing automated responses to the detection of vulnerabilities
Good overview on the AWS services for serverless architectures.
On
Serverless architectures
Very helpful article!
On
Access permissions that are necessary for logging
Not bad, but found some areas needing more clarity. For instance, the steps for setup weren’t detailed enough for a…
On
Performing queries to validate security events (for example, by using Amazon Athena)
load more comments
Search for:
x