Chapter II · The library

AWS Solutions Architect — Associate — Library

Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.

Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 385 of 507 · 15,202 items match
  • Design Secure Architecturesscenario Members

    Architecting Inspector for identity perimeter inside a shared services account

    inspectoridentitysecuritycompliance
  • Design Secure Architecturescore Members

    Designing Inspector for identity perimeter for a regulated data-lake workload

    inspectoridentitysecuritycompliance
  • Design Secure Architecturescore Members

    Designing Inspector for identity perimeter for a cross-account pipeline

    inspectoridentitysecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Inspector for identity perimeter for a public web API

    inspectoridentitysecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Inspector for identity perimeter with developer sandbox isolation

    inspectoridentitysecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Inspector for identity perimeter with break-glass emergency access

    inspectoridentitysecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Inspector for identity perimeter for a PCI in-scope environment

    inspectoridentitysecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Inspector for identity perimeter for a HIPAA in-scope workload

    inspectoridentitysecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Inspector for identity perimeter with automatic quarantine on finding

    inspectoridentitysecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Inspector for identity perimeter with continuous compliance reporting

    inspectoridentitysecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Macie for least-privilege boundaries for a single production account

    macieleast-privilegesecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Macie for least-privilege boundaries across an AWS Organization

    macieleast-privilegesecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Macie for least-privilege boundaries inside a shared services account

    macieleast-privilegesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Macie for least-privilege boundaries for a regulated data-lake workload

    macieleast-privilegesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Macie for least-privilege boundaries for a cross-account pipeline

    macieleast-privilegesecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Macie for least-privilege boundaries for a public web API

    macieleast-privilegesecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Macie for least-privilege boundaries with developer sandbox isolation

    macieleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for least-privilege boundaries with break-glass emergency access

    macieleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for least-privilege boundaries for a PCI in-scope environment

    macieleast-privilegesecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Macie for least-privilege boundaries for a HIPAA in-scope workload

    macieleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for least-privilege boundaries with automatic quarantine on finding

    macieleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for least-privilege boundaries with continuous compliance reporting

    macieleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for cross-account trust for a single production account

    maciecross-accountsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Macie for cross-account trust across an AWS Organization

    maciecross-accountsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Macie for cross-account trust inside a shared services account

    maciecross-accountsecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for cross-account trust for a regulated data-lake workload

    maciecross-accountsecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for cross-account trust for a cross-account pipeline

    maciecross-accountsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Macie for cross-account trust for a public web API

    maciecross-accountsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Macie for cross-account trust with developer sandbox isolation

    maciecross-accountsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Macie for cross-account trust with break-glass emergency access

    maciecross-accountsecuritycompliance
15,202 matches · Page 385 / 507