What should a solutions architect do to meet these requirements?

1 Comment

  1. Richard
    Author

    As I see it, the answer is:
    Use AWS WAF to protect the API Gateway API. Configure Amazon Inspector to analyze the legacy API. Configure Amazon GuardDuty to monitor for malicious attempts to access the APIs.

Leave a Reply

Your email address will not be published. Required fields are marked *

1 + ten =