Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Earl Bell
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
I noticed a few inaccuracies. You might want to update the section on key management.
On
Choosing encryption techniques based on business requirements
Great read! How do you deal with compliance requirements when architecting backup solutions?
On
Architecting a backup solution that is automated, is cost-effective, and supports business continuity across multiple Availability Zones or Regions
Appreciate the blog post, learned a lot!
On
Deploying security services (for example, AWS Security Hub, Amazon Macie, Amazon GuardDuty, Amazon Inspector, AWS Config, Amazon Detective, AWS Identity and Access Management Access Analyzer)
Thanks for this comprehensive guide!
On
Replication and failover methods for stateful services
How does ASFF handle duplication of findings from multiple sources?
On
AWS Security Finding Format (ASFF)
Great post! It clarified a lot about identifying data sources for security monitoring in AWS architectures.
On
Analyzing architectures to identify monitoring requirements and sources of data for security monitoring
When creating aliases, is there any impact on the function's performance?
On
Lambda versions and aliases
Not sure if I agree with the part on CloudFormation modules being better for security.
On
Implementing infrastructure patterns, governance controls, and security standards into reusable IaC templates (for example, AWS Service Catalog, CloudFormation modules, AWS CDK)
Yes, I've used AWS S3 lifecycle policies to manage data retention. It's quite straightforward and integrates well with other AWS…
On
Data retention policies and archiving strategies
The feature to filter AWS Health events via EventBridge is something I’ll definitely implement. Thanks for highlighting it.
On
Integrating AWS event sources (for example, AWS Health, EventBridge, CloudTrail)
load more comments
Search for:
x