Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
حامد حسینی
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Are there any cost implications for enabling access logs for CloudFront distributions?
On
Log creation in different AWS services (for example, VPC flow logs, load balancer access logs, CloudFront access logs)
This is an excellent resource for security professionals looking to enhance their knowledge about AWS edge services!
On
Selecting appropriate edge services based on anticipated threats and attacks (for example, OWASP Top 10, DDoS)
Can someone explain how to customize the assessment templates for specific compliance standards?
On
Amazon Inspector and common assessment templates
Can Kinesis Data Streams be integrated with other AWS services?
On
Analyzing real-time log streams (for example, using Kinesis Data Streams)
This blog post on AWS network architecture for security and compliance was very informative, thanks!
On
AWS network architecture that meets security and compliance requirements
Can AWS EventBridge be used to create custom event buses for isolated environments?
On
Integrating AWS event sources (for example, AWS Health, EventBridge, CloudTrail)
What are the key differences between AWS Config and CloudFormation in terms of managing infrastructure?
On
Schedule automated tasks by using AWS services (for example, EventBridge, AWS Config).
Does anyone have best practices for naming CloudWatch metrics?
On
Creating CloudWatch metric streams (for example, Amazon S3 or Amazon Kinesis Data Firehose options)
Yes, AWS KMS can automate key rotation and helps securely delete data keys, which in turn makes the encrypted data…
On
How to delete data to meet business and legal requirements
Subnet sizing is always tricky for me.
On
Identify and remediate deployment issues (for example, service quotas, subnet sizing, CloudFormation errors, permissions).
load more comments
Search for: