Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Wilma Frøystad
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
The blog cleared up a lot of confusion I had about secrets management. Thank you!
On
Secrets management (for example, Systems Manager, AWS Secrets Manager)
Appreciate the post, good read!
On
Reviewing implemented solutions to ensure security at every layer
What are the best practices for securing S3 buckets?
On
Reviewing implemented solutions to ensure security at every layer
The advice on network path visualization was very helpful.
On
Test connectivity (for example, Route Analyzer, Reachability Analyzer, tooling)
I've heard of companies falling victim to exposed AWS access keys leading to data leaks. It's a reminder of the…
On
Common cloud security threats (for example, insecure web traffic, exposed AWS access keys, S3 buckets with public access enabled or encryption disabled)
For IAM policies, what's the best practice for granting least privilege?
On
Resource-based policies, service policies, and principal policies
Thanks for the blog! It clarified most of my doubts.
On
Identifying connectivity options (for example, AWS VPN, AWS Direct Connect, public internet)
I've found using AWS Direct Connect with VPN as backup works well for redundant connections.
On
Troubleshoot hybrid and private connectivity issues.
AWS WorkSpaces' persistent state is crucial for ongoing projects. Glad this was covered.
On
Identifying different deployment models (for example, cloud, hybrid, onpremises)
How often should I review my backup and retention policies?
On
Automate snapshots and backups based on use cases (for example, RDS snapshots, AWS Backup, RTO and RPO, Amazon Data Lifecycle Manager, retention policy).
load more comments
Search for: