Chapter II · The library

AWS Solutions Architect — Associate — Library

Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.

Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 344 of 507 · 15,202 items match
  • Design Secure Architecturesfoundation Members

    Using IAM for OIDC federation for a PCI in-scope environment

    iamoidcsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for OIDC federation for a HIPAA in-scope workload

    iamoidcsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for OIDC federation with automatic quarantine on finding

    iamoidcsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for OIDC federation with continuous compliance reporting

    iamoidcsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for encryption at rest for a single production account

    iamencryptionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for encryption at rest across an AWS Organization

    iamencryptionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for encryption at rest inside a shared services account

    iamencryptionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for encryption at rest for a regulated data-lake workload

    iamencryptionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for encryption at rest for a cross-account pipeline

    iamencryptionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for encryption at rest for a public web API

    iamencryptionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for encryption at rest with developer sandbox isolation

    iamencryptionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for encryption at rest with break-glass emergency access

    iamencryptionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for encryption at rest for a PCI in-scope environment

    iamencryptionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for encryption at rest for a HIPAA in-scope workload

    iamencryptionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for encryption at rest with automatic quarantine on finding

    iamencryptionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for encryption at rest with continuous compliance reporting

    iamencryptionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for encryption in transit for a single production account

    iamencryptionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for encryption in transit across an AWS Organization

    iamencryptionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for encryption in transit inside a shared services account

    iamencryptionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for encryption in transit for a regulated data-lake workload

    iamencryptionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for encryption in transit for a cross-account pipeline

    iamencryptionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for encryption in transit for a public web API

    iamencryptionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for encryption in transit with developer sandbox isolation

    iamencryptionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for encryption in transit with break-glass emergency access

    iamencryptionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for encryption in transit for a PCI in-scope environment

    iamencryptionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for encryption in transit for a HIPAA in-scope workload

    iamencryptionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for encryption in transit with automatic quarantine on finding

    iamencryptionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for encryption in transit with continuous compliance reporting

    iamencryptionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for key policies for a single production account

    iamkeysecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for key policies across an AWS Organization

    iamkeysecuritycompliance
15,202 matches · Page 344 / 507