This is Part 7 of a multi-part series of posts on how we securely ran ThreatSim
in AWS for 5 years and did right by our customers. Some of the controls
described are common sense and others are a bit more unique.
Although Amazon operates highly-available data centers, failures