Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Helena Tapia
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Any considerations when integrating AWS Config with Security Hub?
On
How to assess, audit, and evaluate the configurations of AWS resources (for example, by using AWS Config)
How do you set up a CI/CD pipeline using CodeCommit?
On
Git-based version control tools (for example, Git, AWS CodeCommit)
Could someone help me understand how billing works when using CloudWatch metrics from log events?
On
Creating CloudWatch metrics from log events by using metric filters
Are default key policies secure enough for production use?
On
Designing KMS key policies to limit key usage to authorized users
I feel like the post didn’t dive deep enough into real-life examples.
On
How to analyze reachability (for example, by using VPC Reachability Analyzer and Amazon Inspector)
Appreciate the detailed tutorial on achieving high availability!
On
Describing how to achieve high availability by using multiple Availability Zones
User roles vs. user policies—what's the significant difference?
On
Analyzing access or authorization errors to determine cause or effect
Thanks! This is exactly what I needed to prep for my AWS exam.
On
Application integration (for example, Amazon Simple Notification Service [Amazon SNS], Amazon Simple Queue Service [Amazon SQS], AWS Step Functions)
Can we automate the enforcement of S3 Object Lock using AWS Config?
On
Protecting and preserving forensic artifacts (for example, by using S3 Object Lock, isolated forensic accounts, S3 Lifecycle, and S3 replication)
A well-crafted post indeed.
On
Access controls and management across multiple accounts
load more comments
Search for:
x