Chapter II · The library

AWS Solutions Architect — Associate — Library

Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.

Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 345 of 507 · 15,202 items match
  • Design Secure Architecturesscenario Members

    Architecting IAM for key policies inside a shared services account

    iamkeysecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for key policies for a regulated data-lake workload

    iamkeysecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for key policies for a cross-account pipeline

    iamkeysecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for key policies for a public web API

    iamkeysecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for key policies with developer sandbox isolation

    iamkeysecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for key policies with break-glass emergency access

    iamkeysecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for key policies for a PCI in-scope environment

    iamkeysecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for key policies for a HIPAA in-scope workload

    iamkeysecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for key policies with automatic quarantine on finding

    iamkeysecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for key policies with continuous compliance reporting

    iamkeysecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for resource policies for a single production account

    iamresourcesecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for resource policies across an AWS Organization

    iamresourcesecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for resource policies inside a shared services account

    iamresourcesecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for resource policies for a regulated data-lake workload

    iamresourcesecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for resource policies for a cross-account pipeline

    iamresourcesecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for resource policies for a public web API

    iamresourcesecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for resource policies with developer sandbox isolation

    iamresourcesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for resource policies with break-glass emergency access

    iamresourcesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for resource policies for a PCI in-scope environment

    iamresourcesecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for resource policies for a HIPAA in-scope workload

    iamresourcesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for resource policies with automatic quarantine on finding

    iamresourcesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for resource policies with continuous compliance reporting

    iamresourcesecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for bucket policies for a single production account

    iambucketsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for bucket policies across an AWS Organization

    iambucketsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for bucket policies inside a shared services account

    iambucketsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for bucket policies for a regulated data-lake workload

    iambucketsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for bucket policies for a cross-account pipeline

    iambucketsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for bucket policies for a public web API

    iambucketsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for bucket policies with developer sandbox isolation

    iambucketsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for bucket policies with break-glass emergency access

    iambucketsecuritycompliance
15,202 matches · Page 345 / 507