What should a solutions architect do to meet these requirements?

2 Comments

  1. Kimberly
    Author

    From my point of view, the answer is:
    Use AWS WAF to protect the API Gateway API. Configure Amazon Inspector to analyze the legacy API. Configure Amazon GuardDuty to monitor for malicious attempts to access the APIs.

  2. Edward
    Author

    I estimate that the answer is:
    Use AWS WAF to protect the API Gateway API. Configure Amazon Inspector to analyze the legacy API. Configure Amazon GuardDuty to monitor for malicious attempts to access the APIs.

Leave a Reply

Your email address will not be published. Required fields are marked *

four × 1 =