What should a solutions architect do to meet these requirements?

2 Comments

  1. Richard
    Author

    As I see it, the answer is:
    Use AWS WAF to protect the API Gateway API. Configure Amazon Inspector to analyze the legacy API. Configure Amazon GuardDuty to monitor for malicious attempts to access the APIs.

  2. Sophia
    Author

    I assess that the answer is:
    Use AWS WAF to protect the API Gateway API. Configure Amazon Inspector to analyze the legacy API. Configure Amazon GuardDuty to monitor for malicious attempts to access the APIs.

Leave a Reply to Sophia Cancel reply

Your email address will not be published. Required fields are marked *

4 × three =