An AWS customer was targeted with a series of HTTPS DDoS attacks, believed to be the largest layer 7 DDoS reported to date. Starting around 10 AM ET on March 1, 2023, more than 15,500 requests per second (rps) began targeting the AWS customer's load balancer. After 10 min, the number of requests increased to 2,50,000 rps.
This attack resembled receiving the entire daily traffic in only 10s. An AWS service was used to sense and mitigate this DDoS attack as well as prevent bad bots and application vulnerabilities. Identify which of the following AWS services can accomplish this.
To effectively overcome shadow IT and unwarranted usage of cloud resources at FinTech Inc., the organization should implement cloud governance.
1.Addressing Shadow IT:
oPolicy Creation: Establish clear policies regarding the use of cloud services and the procurement of IT resources.
oEnforcement Mechanisms: Implement controls to enforce these policies, such as requiring approval for new cloud services or software.
oEducation and Training: Educate employees about the risks associated with shadow IT and the importance of following IT department rules.
oMonitoring and Reporting: Use tools to monitor cloud usage and report on compliance with governance policies.
1.Benefits of Cloud Governance:
oControl and Visibility: Provides better control over IT resources and visibility into how they are being used.
oCost Management: Helps prevent unnecessary spending on unapproved cloud services.
oSecurity and Compliance: Ensures that cloud services are used in a secure and compliant manner, reducing the risk of breaches.
Microsoft Learn: Discover and manage Shadow IT1.
CrowdStrike: What is Shadow IT? Defining Risks & Benefits2.
Microsoft Security Blog: Top 10 actions to secure your environment3.
SC Magazine: Stop chasing shadow IT: Tackle the root causes of cloud breaches4.
Currently there are no comments in this discussion, be the first to comment!