-
15
Explore the differences and use cases between EFS file systems and storage classes.
-
15
-
2
-
19
-
5
From mere labelling in 2010 to the sophisticated tagging services of today, AWS tagging has seen a rapid evolution.
-
10
Improving AWS IAM hygiene is critical in securing cloud.. From reviewing your IAM policies to enabling MFA, monitoring your IAM activity, each step is important.
-
9
Understand how IMDSv2 improves security. Identify instances with IMDSv1 or IMDSv2. Know how to enforce IMdSv2.
-
14
AWS IAM is the foundation for AWS Cloud Security.Cloud engineer must learn & understand the IAM conceptual model. Use tools to create perfect IAM policies.
-
10
Not all AWS Services are available in all AWS regions. Simple ways you can find all AWS regions AWS services are available.
-
21
AWS Config is used to track and audit AWS resources.AWS Config has many disadvantages.AWS Config setup is complicated and does not offer complete visibility.
-
20
VPC Interface Endpoints (powered by AWS PrivateLink) are a powerful technology to improve security and performance in an AWS environment
-
14
Discover how AWS Graviton processors enhance cloud performance & cost efficiency. Learn about Graviton, migration tips, and optimization strategies
Broadcast
JoyK
Better personal homepage
reddit style
GitHub Flavored Markdown syntax
Adaptive layout