Chapter II · The library

AWS Solutions Architect — Associate — Library

Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.

Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 392 of 507 · 15,202 items match
  • Design Secure Architecturescore Members

    Designing Macie for ingress filtering for a PCI in-scope environment

    macieingresssecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Macie for ingress filtering for a HIPAA in-scope workload

    macieingresssecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for ingress filtering with automatic quarantine on finding

    macieingresssecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for ingress filtering with continuous compliance reporting

    macieingresssecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Macie for identity perimeter for a single production account

    macieidentitysecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for identity perimeter across an AWS Organization

    macieidentitysecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for identity perimeter inside a shared services account

    macieidentitysecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Macie for identity perimeter for a regulated data-lake workload

    macieidentitysecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Macie for identity perimeter for a cross-account pipeline

    macieidentitysecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for identity perimeter for a public web API

    macieidentitysecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for identity perimeter with developer sandbox isolation

    macieidentitysecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Macie for identity perimeter with break-glass emergency access

    macieidentitysecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Macie for identity perimeter for a PCI in-scope environment

    macieidentitysecuritycompliance
  • Design Secure Architecturescore Members

    Designing Macie for identity perimeter for a HIPAA in-scope workload

    macieidentitysecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Macie for identity perimeter with automatic quarantine on finding

    macieidentitysecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Macie for identity perimeter with continuous compliance reporting

    macieidentitysecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using WAF for least-privilege boundaries for a single production account

    wafleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing WAF for least-privilege boundaries across an AWS Organization

    wafleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing WAF for least-privilege boundaries inside a shared services account

    wafleast-privilegesecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using WAF for least-privilege boundaries for a regulated data-lake workload

    wafleast-privilegesecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using WAF for least-privilege boundaries for a cross-account pipeline

    wafleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing WAF for least-privilege boundaries for a public web API

    wafleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing WAF for least-privilege boundaries with developer sandbox isolation

    wafleast-privilegesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting WAF for least-privilege boundaries with break-glass emergency access

    wafleast-privilegesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting WAF for least-privilege boundaries for a PCI in-scope environment

    wafleast-privilegesecuritycompliance
  • Design Secure Architecturescore Members

    Designing WAF for least-privilege boundaries for a HIPAA in-scope workload

    wafleast-privilegesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting WAF for least-privilege boundaries with automatic quarantine on finding

    wafleast-privilegesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting WAF for least-privilege boundaries with continuous compliance reporting

    wafleast-privilegesecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting WAF for cross-account trust for a single production account

    wafcross-accountsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using WAF for cross-account trust across an AWS Organization

    wafcross-accountsecuritycompliance
15,202 matches · Page 392 / 507