
AWS Certified Solutions Architect - Professional
Get started today
Ultimate access to all questions.
A company's public API, which operates as tasks on Amazon Elastic Container Service (Amazon ECS) and runs on AWS Fargate behind an Application Load Balancer (ALB), has been functioning smoothly for several months with Service Auto Scaling based on CPU utilization. However, recent performance degradation has rendered the application non-functional due to a surge in SQL injection attacks, causing the API service to scale up to its maximum capacity. A solutions architect is tasked with devising a solution to shield the ECS API service from these attacks, ensuring that legitimate traffic is not obstructed and operational efficiency is maximized. What measures should the solutions architect take to achieve this?
A company's public API, which operates as tasks on Amazon Elastic Container Service (Amazon ECS) and runs on AWS Fargate behind an Application Load Balancer (ALB), has been functioning smoothly for several months with Service Auto Scaling based on CPU utilization. However, recent performance degradation has rendered the application non-functional due to a surge in SQL injection attacks, causing the API service to scale up to its maximum capacity. A solutions architect is tasked with devising a solution to shield the ECS API service from these attacks, ensuring that legitimate traffic is not obstructed and operational efficiency is maximized. What measures should the solutions architect take to achieve this?
Exam-Like