Chapter II · The library

AWS Solutions Architect — Associate — Library

Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.

Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 342 of 507 · 15,202 items match
  • Design Resilient Architecturesfoundation Members

    Using Elastic Disaster Recovery for chaos testing for a stateful session store

    elastic-disaster-recoverychaosresilienceha
  • Design Resilient Architecturescore Members

    Designing Elastic Disaster Recovery for chaos testing for an event-driven microservice

    elastic-disaster-recoverychaosresilienceha
  • Design Resilient Architecturescore Members

    Designing Elastic Disaster Recovery for chaos testing surviving a full AZ outage

    elastic-disaster-recoverychaosresilienceha
  • Design Resilient Architecturesscenario Members

    Architecting Elastic Disaster Recovery for chaos testing surviving a regional outage

    elastic-disaster-recoverychaosresilienceha
  • Design Secure Architecturesfoundation Members

    Using IAM for least-privilege boundaries for a single production account

    iamleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for least-privilege boundaries across an AWS Organization

    iamleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for least-privilege boundaries inside a shared services account

    iamleast-privilegesecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for least-privilege boundaries for a regulated data-lake workload

    iamleast-privilegesecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for least-privilege boundaries for a cross-account pipeline

    iamleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for least-privilege boundaries for a public web API

    iamleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for least-privilege boundaries with developer sandbox isolation

    iamleast-privilegesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for least-privilege boundaries with break-glass emergency access

    iamleast-privilegesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for least-privilege boundaries for a PCI in-scope environment

    iamleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for least-privilege boundaries for a HIPAA in-scope workload

    iamleast-privilegesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for least-privilege boundaries with automatic quarantine on finding

    iamleast-privilegesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for least-privilege boundaries with continuous compliance reporting

    iamleast-privilegesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for cross-account trust for a single production account

    iamcross-accountsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for cross-account trust across an AWS Organization

    iamcross-accountsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for cross-account trust inside a shared services account

    iamcross-accountsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for cross-account trust for a regulated data-lake workload

    iamcross-accountsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for cross-account trust for a cross-account pipeline

    iamcross-accountsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for cross-account trust for a public web API

    iamcross-accountsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for cross-account trust with developer sandbox isolation

    iamcross-accountsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for cross-account trust with break-glass emergency access

    iamcross-accountsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for cross-account trust for a PCI in-scope environment

    iamcross-accountsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for cross-account trust for a HIPAA in-scope workload

    iamcross-accountsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for cross-account trust with automatic quarantine on finding

    iamcross-accountsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for cross-account trust with continuous compliance reporting

    iamcross-accountsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for credential rotation for a single production account

    iamcredentialsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for credential rotation across an AWS Organization

    iamcredentialsecuritycompliance
15,202 matches · Page 342 / 507