Chapter II · The library
AWS Solutions Architect — Associate — Library
Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.
Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 402 of 507 · 15,202 items match
- Design Secure Architecturesfoundation Members
Using Shield for encryption at rest for a PCI in-scope environment
shieldencryptionsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for encryption at rest for a HIPAA in-scope workload
shieldencryptionsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for encryption at rest with automatic quarantine on finding
shieldencryptionsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for encryption at rest with continuous compliance reporting
shieldencryptionsecuritycompliance - Design Secure Architecturescore Members
Designing Shield for encryption in transit for a single production account
shieldencryptionsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for encryption in transit across an AWS Organization
shieldencryptionsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for encryption in transit inside a shared services account
shieldencryptionsecuritycompliance - Design Secure Architecturescore Members
Designing Shield for encryption in transit for a regulated data-lake workload
shieldencryptionsecuritycompliance - Design Secure Architecturescore Members
Designing Shield for encryption in transit for a cross-account pipeline
shieldencryptionsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for encryption in transit for a public web API
shieldencryptionsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for encryption in transit with developer sandbox isolation
shieldencryptionsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for encryption in transit with break-glass emergency access
shieldencryptionsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for encryption in transit for a PCI in-scope environment
shieldencryptionsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for encryption in transit for a HIPAA in-scope workload
shieldencryptionsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for encryption in transit with automatic quarantine on finding
shieldencryptionsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for encryption in transit with continuous compliance reporting
shieldencryptionsecuritycompliance - Design Secure Architecturescore Members
Designing Shield for key policies for a single production account
shieldkeysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for key policies across an AWS Organization
shieldkeysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for key policies inside a shared services account
shieldkeysecuritycompliance - Design Secure Architecturescore Members
Designing Shield for key policies for a regulated data-lake workload
shieldkeysecuritycompliance - Design Secure Architecturescore Members
Designing Shield for key policies for a cross-account pipeline
shieldkeysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for key policies for a public web API
shieldkeysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for key policies with developer sandbox isolation
shieldkeysecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for key policies with break-glass emergency access
shieldkeysecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for key policies for a PCI in-scope environment
shieldkeysecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for key policies for a HIPAA in-scope workload
shieldkeysecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for key policies with automatic quarantine on finding
shieldkeysecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for key policies with continuous compliance reporting
shieldkeysecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for resource policies for a single production account
shieldresourcesecuritycompliance - Design Secure Architecturescore Members
Designing Shield for resource policies across an AWS Organization
shieldresourcesecuritycompliance