What combination of steps could a Solutions Architect take to protect a web workload running on Amazon EC2 from DDoS and application layer attacks?

Leave a Reply

Your email address will not be published. Required fields are marked *

18 + four =