Posts

Showing posts with the label infosavvy

VPC Network Access Control Lists

Image
VPC Network Access Control Lists (NACL) functions as a firewall in that it contains inbound and outbound rules to allow traffic based on a source or destination CIDR, protocol, and port. Also, each  VPC   has a default NACL that can’t be deleted. But the similarities end there. A NACL differs from a security group in many respects. Instead of being attached to an ENI, a NACL is attached to a subnet. The NACL associated with a subnet controls what traffic may enter and exit that subnet. This means that NACLs can’t be used to control traffic between instances in the same subnet. If you want to do that, you have to use security groups. A subnet can have only one NACL associated with it. When you create a new subnet in a VPC, the VPC’s default NACL is associated with the subnet by default. You can modify the default NACL, or you can create a new one and associate it with the subnet. You can also associate the same NACL with multiple  subnets , provided those subnets a...

Services Related Elastic Compute Cloud (EC2)

Image
Services Related Elastic Compute Cloud (EC2) in this article you will learn different types of EC2 Services like AWS Systems Manager, Placement Groups, AWS Elastic Beanstalk and Amazon Elastic Container Service and AWS Far gate etc. EC2-Related Services This section will briefly introduce you to a few more  EC2 features . Some of these features won’t necessarily play a large role in the solutions architect exam but could definitely come in handy for you in your work at some point. Others are only touched on here but will be examined in greater detail later in the book. Related Products: –  AWS Certified Solutions Architect | Associate AWS Systems Manager Systems Manager Services (available through the AWS console) is a collection of tools for monitoring and managing the resources you have running in the  AWS  cloud and in your own on-premises infrastructure. Through the Systems Manager portal, you can organize your AWS resources into resource groups, ...

ISO 27001 Clause 9.1 Performance evaluation Monitoring, measurement, analysis & evaluation

Image
Required activity ISO 27001 Clause 9.1 Performance evaluation Monitoring, measurement, analysis & evaluation, The organization evaluates the knowledge security performance and therefore the effectiveness of the  ISMS . Implementation Guideline The objective of monitoring and measurement is to assist the organization to gauge whether the intended outcome of data security activities including  risk assessment and treatment   is achieved as planned. Monitoring determines the status of a system, a process or an activity, whilst measurement may be a process to work out a worth . Thus, monitoring is often achieved through a succession of comparable measurements over a while period. Related Products: –  ISO 27001 Lead Auditor Training and Certification For monitoring and measurement, the organization establishes: What to watch and measure; Who monitors and measures Methods to be used so on produce valid results (i.e. comparable and reproducible). ...