AWS re:Inforce 2019: Security Best Practices the Well-Architected Way (SDD318)

Поділитися
Вставка
  • Опубліковано 14 жов 2024
  • As you continually evolve your use of the AWS platform, it’s important to consider ways to improve your security posture and take advantage of new security services and features. In this advanced session, we share architectural patterns for meeting common challenges, service limits and tips, tricks, and ways to continually evaluate your architecture against best practices. Automation and tools are featured throughout, and there will be code giveaways! Be prepared for a technically deep session on AWS security.

КОМЕНТАРІ • 12

  • @bayesian7404
    @bayesian7404 3 роки тому

    Great work Ben. You have a bit of an attacker personality, which is necessary for good security architectures and engineering.
    Thank you for another great and super informative talk. Two years later it is still solid.

  • @ahapraveen
    @ahapraveen 2 роки тому

    Very useful and sincere thanks to the speaker

  • @Robert-3691
    @Robert-3691 8 місяців тому

    I'm enchanted by this content. I had the pleasure of reading something similar, and I was completely enchanted. "Mastering AWS: A Software Engineers Guide" by Nathan Vale

  • @joshuaglassmyer8358
    @joshuaglassmyer8358 5 років тому +5

    Great stuff. Thank you Ben!

  • @andreelyusef3235
    @andreelyusef3235 4 роки тому +2

    Very helpful video sir. Keep them coming.

  • @ghettosapien1392
    @ghettosapien1392 2 роки тому

    That was very helpful.

  • @JungKugoso
    @JungKugoso 4 роки тому +3

    Golden session!

  • @spangley2817
    @spangley2817 2 роки тому

    If my server is compromised /cyber targeted and imposter created alias though reported to AWS through server and email the use of malicious cert on comcast router UI redirects to AWS imposter/false tech support - I can't report the continued hack! Is there on site location to prove identity ownership?

  • @karan7377
    @karan7377 2 роки тому

    awesome preso Ben :>