A Network Engineer is designing a new system on AWS that will take advantage of Amazon CloudFront for both content caching and for protecting the underlying origin. There is concern that an external agency might be able to access the IP addresses for the application's origin and then attack the origin despite it being served by CloudFront. Which of the following solutions provides the strongest level of protection to the origin?
PANDU
Highly Voted 3 years, 8 months agoohcan
3 years, 8 months agojason2009
3 years, 6 months agoStelSen
3 years, 6 months agoRim007
3 years, 7 months agosapien45
3 years, 2 months agodpvnme
Highly Voted 3 years, 8 months agoclooudy
Most Recent 3 years agoclooudy
3 years agoFunkyB
3 years, 4 months agoStelSen
3 years, 6 months agoHuy
3 years, 6 months agoIshu_awsguy
3 years, 6 months agoSantya
3 years, 6 months agojason2009
3 years, 7 months agoclooudy
3 years agojonclem
3 years, 7 months ago2aldous
3 years, 7 months agosensor
3 years, 7 months agocardiryh
3 years, 7 months agokvirk
3 years, 7 months agokvirk
3 years, 7 months agorootx
3 years, 7 months agojpvdham
3 years, 7 months agoAverageguy
3 years, 7 months ago