Chapter II · The library
AWS Solutions Architect — Associate — Library
Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.
Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 385 of 507 · 15,202 items match
- Design Secure Architecturesscenario Members
Architecting Inspector for identity perimeter inside a shared services account
inspectoridentitysecuritycompliance - Design Secure Architecturescore Members
Designing Inspector for identity perimeter for a regulated data-lake workload
inspectoridentitysecuritycompliance - Design Secure Architecturescore Members
Designing Inspector for identity perimeter for a cross-account pipeline
inspectoridentitysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Inspector for identity perimeter for a public web API
inspectoridentitysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Inspector for identity perimeter with developer sandbox isolation
inspectoridentitysecuritycompliance - Design Secure Architecturesfoundation Members
Using Inspector for identity perimeter with break-glass emergency access
inspectoridentitysecuritycompliance - Design Secure Architecturesfoundation Members
Using Inspector for identity perimeter for a PCI in-scope environment
inspectoridentitysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Inspector for identity perimeter for a HIPAA in-scope workload
inspectoridentitysecuritycompliance - Design Secure Architecturesfoundation Members
Using Inspector for identity perimeter with automatic quarantine on finding
inspectoridentitysecuritycompliance - Design Secure Architecturesfoundation Members
Using Inspector for identity perimeter with continuous compliance reporting
inspectoridentitysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Macie for least-privilege boundaries for a single production account
macieleast-privilegesecuritycompliance - Design Secure Architecturesfoundation Members
Using Macie for least-privilege boundaries across an AWS Organization
macieleast-privilegesecuritycompliance - Design Secure Architecturesfoundation Members
Using Macie for least-privilege boundaries inside a shared services account
macieleast-privilegesecuritycompliance - Design Secure Architecturesscenario Members
Architecting Macie for least-privilege boundaries for a regulated data-lake workload
macieleast-privilegesecuritycompliance - Design Secure Architecturesscenario Members
Architecting Macie for least-privilege boundaries for a cross-account pipeline
macieleast-privilegesecuritycompliance - Design Secure Architecturesfoundation Members
Using Macie for least-privilege boundaries for a public web API
macieleast-privilegesecuritycompliance - Design Secure Architecturesfoundation Members
Using Macie for least-privilege boundaries with developer sandbox isolation
macieleast-privilegesecuritycompliance - Design Secure Architecturescore Members
Designing Macie for least-privilege boundaries with break-glass emergency access
macieleast-privilegesecuritycompliance - Design Secure Architecturescore Members
Designing Macie for least-privilege boundaries for a PCI in-scope environment
macieleast-privilegesecuritycompliance - Design Secure Architecturesfoundation Members
Using Macie for least-privilege boundaries for a HIPAA in-scope workload
macieleast-privilegesecuritycompliance - Design Secure Architecturescore Members
Designing Macie for least-privilege boundaries with automatic quarantine on finding
macieleast-privilegesecuritycompliance - Design Secure Architecturescore Members
Designing Macie for least-privilege boundaries with continuous compliance reporting
macieleast-privilegesecuritycompliance - Design Secure Architecturescore Members
Designing Macie for cross-account trust for a single production account
maciecross-accountsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Macie for cross-account trust across an AWS Organization
maciecross-accountsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Macie for cross-account trust inside a shared services account
maciecross-accountsecuritycompliance - Design Secure Architecturescore Members
Designing Macie for cross-account trust for a regulated data-lake workload
maciecross-accountsecuritycompliance - Design Secure Architecturescore Members
Designing Macie for cross-account trust for a cross-account pipeline
maciecross-accountsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Macie for cross-account trust for a public web API
maciecross-accountsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Macie for cross-account trust with developer sandbox isolation
maciecross-accountsecuritycompliance - Design Secure Architecturesfoundation Members
Using Macie for cross-account trust with break-glass emergency access
maciecross-accountsecuritycompliance