Which steps should a solutions architect take to block requests from unauthorized users?

1 Comment

  1. Gabriel
    Author

    If I had to guess, I’d say the answer is:
    Create a usage plan with an API key that is shared with genuine users only.

Leave a Reply

Your email address will not be published. Required fields are marked *

five × five =