Chapter II · The library
AWS Solutions Architect — Associate — Library
Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.
Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 392 of 507 · 15,202 items match
- Design Secure Architecturescore Members
Designing Macie for ingress filtering for a PCI in-scope environment
macieingresssecuritycompliance - Design Secure Architecturesfoundation Members
Using Macie for ingress filtering for a HIPAA in-scope workload
macieingresssecuritycompliance - Design Secure Architecturescore Members
Designing Macie for ingress filtering with automatic quarantine on finding
macieingresssecuritycompliance - Design Secure Architecturescore Members
Designing Macie for ingress filtering with continuous compliance reporting
macieingresssecuritycompliance - Design Secure Architecturesfoundation Members
Using Macie for identity perimeter for a single production account
macieidentitysecuritycompliance - Design Secure Architecturescore Members
Designing Macie for identity perimeter across an AWS Organization
macieidentitysecuritycompliance - Design Secure Architecturescore Members
Designing Macie for identity perimeter inside a shared services account
macieidentitysecuritycompliance - Design Secure Architecturesfoundation Members
Using Macie for identity perimeter for a regulated data-lake workload
macieidentitysecuritycompliance - Design Secure Architecturesfoundation Members
Using Macie for identity perimeter for a cross-account pipeline
macieidentitysecuritycompliance - Design Secure Architecturescore Members
Designing Macie for identity perimeter for a public web API
macieidentitysecuritycompliance - Design Secure Architecturescore Members
Designing Macie for identity perimeter with developer sandbox isolation
macieidentitysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Macie for identity perimeter with break-glass emergency access
macieidentitysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Macie for identity perimeter for a PCI in-scope environment
macieidentitysecuritycompliance - Design Secure Architecturescore Members
Designing Macie for identity perimeter for a HIPAA in-scope workload
macieidentitysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Macie for identity perimeter with automatic quarantine on finding
macieidentitysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Macie for identity perimeter with continuous compliance reporting
macieidentitysecuritycompliance - Design Secure Architecturesfoundation Members
Using WAF for least-privilege boundaries for a single production account
wafleast-privilegesecuritycompliance - Design Secure Architecturescore Members
Designing WAF for least-privilege boundaries across an AWS Organization
wafleast-privilegesecuritycompliance - Design Secure Architecturescore Members
Designing WAF for least-privilege boundaries inside a shared services account
wafleast-privilegesecuritycompliance - Design Secure Architecturesfoundation Members
Using WAF for least-privilege boundaries for a regulated data-lake workload
wafleast-privilegesecuritycompliance - Design Secure Architecturesfoundation Members
Using WAF for least-privilege boundaries for a cross-account pipeline
wafleast-privilegesecuritycompliance - Design Secure Architecturescore Members
Designing WAF for least-privilege boundaries for a public web API
wafleast-privilegesecuritycompliance - Design Secure Architecturescore Members
Designing WAF for least-privilege boundaries with developer sandbox isolation
wafleast-privilegesecuritycompliance - Design Secure Architecturesscenario Members
Architecting WAF for least-privilege boundaries with break-glass emergency access
wafleast-privilegesecuritycompliance - Design Secure Architecturesscenario Members
Architecting WAF for least-privilege boundaries for a PCI in-scope environment
wafleast-privilegesecuritycompliance - Design Secure Architecturescore Members
Designing WAF for least-privilege boundaries for a HIPAA in-scope workload
wafleast-privilegesecuritycompliance - Design Secure Architecturesscenario Members
Architecting WAF for least-privilege boundaries with automatic quarantine on finding
wafleast-privilegesecuritycompliance - Design Secure Architecturesscenario Members
Architecting WAF for least-privilege boundaries with continuous compliance reporting
wafleast-privilegesecuritycompliance - Design Secure Architecturesscenario Members
Architecting WAF for cross-account trust for a single production account
wafcross-accountsecuritycompliance - Design Secure Architecturesfoundation Members
Using WAF for cross-account trust across an AWS Organization
wafcross-accountsecuritycompliance