allWhat additional steps will addressof the identified attack types while providing high availability and minimizing risk?

1 Comment

  1. Kathleen
    Author

    I surmise that the answer is:
    Disable SSH access to the Amazon EC2 instances. Migrate on-premises MySQL to Amazon RDS Multi-AZ. Leverage an Elastic Load Balancer to spread the load and enable AWS Shield Advanced for protection. Add an Amazon CloudFront distribution in front of the website. Enable AWS WAF on the distribution to manage the rules.

Leave a Reply

Your email address will not be published. Required fields are marked *

seventeen − three =