Caching strategies in AWSJan 25 2024 5 min.Simplified overview of caching strategies and services in AWS
Design principles for microservices in AWSJan 25 2024 10 min.Overview of design principles for microservices and their application in AWS based microservice architectures.
Encryption and appropriate key management in AWSJan 24 2024 10 min.Simplified overview of encryption and key management in AWS#design-secure-architectures-aws-certified-solutions-architect-associate-saa-c03-domain-1
Data retention and classification in AWSJan 23 2024 8 min.Overview of data retention and classification features and services in AWS#design-secure-architectures-aws-certified-solutions-architect-associate-saa-c03-domain-1
Threat vectors external to AWSJan 22 2024 8 min.Overview of threat vectors external to AWS infrastructure but impacting AWS resources, services and user applications.#design-secure-architectures-aws-certified-solutions-architect-associate-saa-c03-domain-1
Control ports, protocols, and network traffic on AWSJan 22 2024 5 min.Summary of AWS networking features and services.#design-secure-architectures-aws-certified-solutions-architect-associate-saa-c03-domain-1
AWS security services with appropriate use casesJan 21 2024 15 min.Comprehensive overview of AWS security services for workloads and applications#design-secure-architectures-aws-certified-solutions-architect-associate-saa-c03-domain-1
Secure application access in AWSJan 20 2024 5 min.Secure access to applications is directly related to both how users access these applications and how the applications themselves access other applications and resources in AWS#design-secure-architectures-aws-certified-solutions-architect-associate-saa-c03-domain-1
AWS service endpointsJan 20 2024 5 min.AWS service endpoints are public access points for programmatically interacting with AWS services or for referencing them.#design-secure-architectures-aws-certified-solutions-architect-associate-saa-c03-domain-1
Application configuration and credentials security in AWSJan 19 2024 10 min.Securing application configuration and credentials is vital for both the functioning of the application and controlling access to it#design-secure-architectures-aws-certified-solutions-architect-associate-saa-c03-domain-1
The AWS shared responsibility modelJan 19 2024 3 min.The model explains shared security and compliance between AWS and the Customer in the AWS ecosystem#design-secure-architectures-aws-certified-solutions-architect-associate-saa-c03-domain-1