Chapter II · The library

AWS Solutions Architect — Associate — Library

Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.

Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 343 of 507 · 15,202 items match
  • Design Secure Architecturesfoundation Members

    Using IAM for credential rotation inside a shared services account

    iamcredentialsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for credential rotation for a regulated data-lake workload

    iamcredentialsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for credential rotation for a cross-account pipeline

    iamcredentialsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for credential rotation for a public web API

    iamcredentialsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for credential rotation with developer sandbox isolation

    iamcredentialsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for credential rotation with break-glass emergency access

    iamcredentialsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for credential rotation for a PCI in-scope environment

    iamcredentialsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for credential rotation for a HIPAA in-scope workload

    iamcredentialsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for credential rotation with automatic quarantine on finding

    iamcredentialsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for credential rotation with continuous compliance reporting

    iamcredentialsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for SAML federation for a single production account

    iamsamlsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for SAML federation across an AWS Organization

    iamsamlsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for SAML federation inside a shared services account

    iamsamlsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for SAML federation for a regulated data-lake workload

    iamsamlsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for SAML federation for a cross-account pipeline

    iamsamlsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for SAML federation for a public web API

    iamsamlsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for SAML federation with developer sandbox isolation

    iamsamlsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for SAML federation with break-glass emergency access

    iamsamlsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for SAML federation for a PCI in-scope environment

    iamsamlsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for SAML federation for a HIPAA in-scope workload

    iamsamlsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for SAML federation with automatic quarantine on finding

    iamsamlsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for SAML federation with continuous compliance reporting

    iamsamlsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for OIDC federation for a single production account

    iamoidcsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for OIDC federation across an AWS Organization

    iamoidcsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for OIDC federation inside a shared services account

    iamoidcsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for OIDC federation for a regulated data-lake workload

    iamoidcsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for OIDC federation for a cross-account pipeline

    iamoidcsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for OIDC federation for a public web API

    iamoidcsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for OIDC federation with developer sandbox isolation

    iamoidcsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for OIDC federation with break-glass emergency access

    iamoidcsecuritycompliance
15,202 matches · Page 343 / 507