Chapter II · The library

AWS Solutions Architect — Associate — Library

Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.

Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 346 of 507 · 15,202 items match
  • Design Secure Architecturesfoundation Members

    Using IAM for bucket policies for a PCI in-scope environment

    iambucketsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for bucket policies for a HIPAA in-scope workload

    iambucketsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for bucket policies with automatic quarantine on finding

    iambucketsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for bucket policies with continuous compliance reporting

    iambucketsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for session tagging for a single production account

    iamsessionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for session tagging across an AWS Organization

    iamsessionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for session tagging inside a shared services account

    iamsessionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for session tagging for a regulated data-lake workload

    iamsessionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for session tagging for a cross-account pipeline

    iamsessionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for session tagging for a public web API

    iamsessionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for session tagging with developer sandbox isolation

    iamsessionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for session tagging with break-glass emergency access

    iamsessionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for session tagging for a PCI in-scope environment

    iamsessionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for session tagging for a HIPAA in-scope workload

    iamsessionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for session tagging with automatic quarantine on finding

    iamsessionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for session tagging with continuous compliance reporting

    iamsessionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for condition keys for a single production account

    iamconditionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for condition keys across an AWS Organization

    iamconditionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for condition keys inside a shared services account

    iamconditionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for condition keys for a regulated data-lake workload

    iamconditionsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using IAM for condition keys for a cross-account pipeline

    iamconditionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for condition keys for a public web API

    iamconditionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for condition keys with developer sandbox isolation

    iamconditionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for condition keys with break-glass emergency access

    iamconditionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for condition keys for a PCI in-scope environment

    iamconditionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for condition keys for a HIPAA in-scope workload

    iamconditionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for condition keys with automatic quarantine on finding

    iamconditionsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for condition keys with continuous compliance reporting

    iamconditionsecuritycompliance
  • Design Secure Architecturescore Members

    Designing IAM for MFA enforcement for a single production account

    iammfasecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting IAM for MFA enforcement across an AWS Organization

    iammfasecuritycompliance
15,202 matches · Page 346 / 507