Which architecture should the Security Engineer use to meet these requirements?

2 Comments

  1. Diane
    Author

    I surmise that the answer is:
    Use AWS WAF to scan inbound traffic for web exploits. Use a third-party AWS Marketplace solution to restrict egress traffic to specific whitelisted URLs.

  2. Amy
    Author

    As far as I can tell, the answer is:
    Use AWS WAF to scan inbound traffic for web exploits. Use a third-party AWS Marketplace solution to restrict egress traffic to specific whitelisted URLs.

Leave a Reply

Your email address will not be published. Required fields are marked *

fourteen − nine =