Chapter II · The library
AWS Solutions Architect — Associate — Library
Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.
Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 405 of 507 · 15,202 items match
- Design Secure Architecturesscenario Members
Architecting Shield for audit retention inside a shared services account
shieldauditsecuritycompliance - Design Secure Architecturescore Members
Designing Shield for audit retention for a regulated data-lake workload
shieldauditsecuritycompliance - Design Secure Architecturescore Members
Designing Shield for audit retention for a cross-account pipeline
shieldauditsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for audit retention for a public web API
shieldauditsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for audit retention with developer sandbox isolation
shieldauditsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for audit retention with break-glass emergency access
shieldauditsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for audit retention for a PCI in-scope environment
shieldauditsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for audit retention for a HIPAA in-scope workload
shieldauditsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for audit retention with automatic quarantine on finding
shieldauditsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for audit retention with continuous compliance reporting
shieldauditsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for threat detection for a single production account
shieldthreatsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for threat detection across an AWS Organization
shieldthreatsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for threat detection inside a shared services account
shieldthreatsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for threat detection for a regulated data-lake workload
shieldthreatsecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for threat detection for a cross-account pipeline
shieldthreatsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for threat detection for a public web API
shieldthreatsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for threat detection with developer sandbox isolation
shieldthreatsecuritycompliance - Design Secure Architecturescore Members
Designing Shield for threat detection with break-glass emergency access
shieldthreatsecuritycompliance - Design Secure Architecturescore Members
Designing Shield for threat detection for a PCI in-scope environment
shieldthreatsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for threat detection for a HIPAA in-scope workload
shieldthreatsecuritycompliance - Design Secure Architecturescore Members
Designing Shield for threat detection with automatic quarantine on finding
shieldthreatsecuritycompliance - Design Secure Architecturescore Members
Designing Shield for threat detection with continuous compliance reporting
shieldthreatsecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for egress inspection for a single production account
shieldegresssecuritycompliance - Design Secure Architecturescore Members
Designing Shield for egress inspection across an AWS Organization
shieldegresssecuritycompliance - Design Secure Architecturescore Members
Designing Shield for egress inspection inside a shared services account
shieldegresssecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for egress inspection for a regulated data-lake workload
shieldegresssecuritycompliance - Design Secure Architecturesfoundation Members
Using Shield for egress inspection for a cross-account pipeline
shieldegresssecuritycompliance - Design Secure Architecturescore Members
Designing Shield for egress inspection for a public web API
shieldegresssecuritycompliance - Design Secure Architecturescore Members
Designing Shield for egress inspection with developer sandbox isolation
shieldegresssecuritycompliance - Design Secure Architecturesscenario Members
Architecting Shield for egress inspection with break-glass emergency access
shieldegresssecuritycompliance