Chapter II · The library
AWS Solutions Architect — Associate — Library
Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.
Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 345 of 507 · 15,202 items match
- Design Secure Architecturesscenario Members
Architecting IAM for key policies inside a shared services account
iamkeysecuritycompliance - Design Secure Architecturescore Members
Designing IAM for key policies for a regulated data-lake workload
iamkeysecuritycompliance - Design Secure Architecturescore Members
Designing IAM for key policies for a cross-account pipeline
iamkeysecuritycompliance - Design Secure Architecturesscenario Members
Architecting IAM for key policies for a public web API
iamkeysecuritycompliance - Design Secure Architecturesscenario Members
Architecting IAM for key policies with developer sandbox isolation
iamkeysecuritycompliance - Design Secure Architecturesfoundation Members
Using IAM for key policies with break-glass emergency access
iamkeysecuritycompliance - Design Secure Architecturesfoundation Members
Using IAM for key policies for a PCI in-scope environment
iamkeysecuritycompliance - Design Secure Architecturesscenario Members
Architecting IAM for key policies for a HIPAA in-scope workload
iamkeysecuritycompliance - Design Secure Architecturesfoundation Members
Using IAM for key policies with automatic quarantine on finding
iamkeysecuritycompliance - Design Secure Architecturesfoundation Members
Using IAM for key policies with continuous compliance reporting
iamkeysecuritycompliance - Design Secure Architecturesfoundation Members
Using IAM for resource policies for a single production account
iamresourcesecuritycompliance - Design Secure Architecturescore Members
Designing IAM for resource policies across an AWS Organization
iamresourcesecuritycompliance - Design Secure Architecturescore Members
Designing IAM for resource policies inside a shared services account
iamresourcesecuritycompliance - Design Secure Architecturesfoundation Members
Using IAM for resource policies for a regulated data-lake workload
iamresourcesecuritycompliance - Design Secure Architecturesfoundation Members
Using IAM for resource policies for a cross-account pipeline
iamresourcesecuritycompliance - Design Secure Architecturescore Members
Designing IAM for resource policies for a public web API
iamresourcesecuritycompliance - Design Secure Architecturescore Members
Designing IAM for resource policies with developer sandbox isolation
iamresourcesecuritycompliance - Design Secure Architecturesscenario Members
Architecting IAM for resource policies with break-glass emergency access
iamresourcesecuritycompliance - Design Secure Architecturesscenario Members
Architecting IAM for resource policies for a PCI in-scope environment
iamresourcesecuritycompliance - Design Secure Architecturescore Members
Designing IAM for resource policies for a HIPAA in-scope workload
iamresourcesecuritycompliance - Design Secure Architecturesscenario Members
Architecting IAM for resource policies with automatic quarantine on finding
iamresourcesecuritycompliance - Design Secure Architecturesscenario Members
Architecting IAM for resource policies with continuous compliance reporting
iamresourcesecuritycompliance - Design Secure Architecturescore Members
Designing IAM for bucket policies for a single production account
iambucketsecuritycompliance - Design Secure Architecturesscenario Members
Architecting IAM for bucket policies across an AWS Organization
iambucketsecuritycompliance - Design Secure Architecturesscenario Members
Architecting IAM for bucket policies inside a shared services account
iambucketsecuritycompliance - Design Secure Architecturescore Members
Designing IAM for bucket policies for a regulated data-lake workload
iambucketsecuritycompliance - Design Secure Architecturescore Members
Designing IAM for bucket policies for a cross-account pipeline
iambucketsecuritycompliance - Design Secure Architecturesscenario Members
Architecting IAM for bucket policies for a public web API
iambucketsecuritycompliance - Design Secure Architecturesscenario Members
Architecting IAM for bucket policies with developer sandbox isolation
iambucketsecuritycompliance - Design Secure Architecturesfoundation Members
Using IAM for bucket policies with break-glass emergency access
iambucketsecuritycompliance