Amazon Web Services775 тыс
Опубликовано 15 апреля 2022, 16:03
It can be difficult to determine the different patterns between legitimate and unwanted traffic on your internet facing applications. By leveraging AWS WAF, you can control the traffic at the edge and secure your architecture. Join Ben as he walks you through how to mitigate this bot traffic.
Additional Resources:
Amazon SNS overview: aws.amazon.com/waf
AWS WAF Security Automations: aws.amazon.com/solutions/imple...
IP Reputation rule groups: docs.aws.amazon.com/waf/latest...
AWS WAF Bot Control: docs.aws.amazon.com/waf/latest...
Check out more resources for architecting in the #AWS cloud:
amzn.to/3qXIsWN
#AWS #AmazonWebServices #CloudComputing #BackToBasics #CloudSecurity
Additional Resources:
Amazon SNS overview: aws.amazon.com/waf
AWS WAF Security Automations: aws.amazon.com/solutions/imple...
IP Reputation rule groups: docs.aws.amazon.com/waf/latest...
AWS WAF Bot Control: docs.aws.amazon.com/waf/latest...
Check out more resources for architecting in the #AWS cloud:
amzn.to/3qXIsWN
#AWS #AmazonWebServices #CloudComputing #BackToBasics #CloudSecurity
Свежие видео