A three-pronged solution for identifying users
The problem of system security starts with discovering the identity of the user on the other end of the communications link. This article discusses three familiar approaches for identifying users, highlights their strengths and weaknesses (alone and in combinations), and provides some examples of each.
Help/Fix on AWS WAP Service(EKS) (1 Hour)
One hour of help or fixes for issues related to your AWS EKS workloads.
AWS S3 Glacier Low Cost Deep Archive configurations
Configure S3 Glacier Deep Archive for ultra low-cost long term data storage.
1 Hour AWS issues/problems review and fix
One hour dedicated session to review and fix a specific AWS issue or problem.
Help/Fix on AWS Auto Scaling (1 Hour)
One hour of help to troubleshoot or fine tune AWS Auto Scaling behaviour.




