# C - while aws provides a good baseline, defense in depth should be a first principle # T - .... # A - https://www.haproxy.com/blog/application-layer-ddos-attack-protection-with-haproxy - https://www.haproxy.com/blog/four-examples-of-haproxy-rate-limiting/ - https://www.haproxy.com/blog/how-to-secure-cookies-using-haproxy-enterprise/ - https://www.haproxy.com/blog/introduction-to-haproxy-logging/ - https://cgomesu.com/blog/Securing-backend-haproxy-pfsense/