Chapter II · The library

AWS Solutions Architect — Associate — Library

Browse the full catalog. Items marked with a lock icon are available to members on the Access plan. Sample items are unlocked for every visitor.

Total items
15,202+
Authored
46
Locked catalog
15,156+
Domains
4
Showing page 405 of 507 · 15,202 items match
  • Design Secure Architecturesscenario Members

    Architecting Shield for audit retention inside a shared services account

    shieldauditsecuritycompliance
  • Design Secure Architecturescore Members

    Designing Shield for audit retention for a regulated data-lake workload

    shieldauditsecuritycompliance
  • Design Secure Architecturescore Members

    Designing Shield for audit retention for a cross-account pipeline

    shieldauditsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Shield for audit retention for a public web API

    shieldauditsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Shield for audit retention with developer sandbox isolation

    shieldauditsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Shield for audit retention with break-glass emergency access

    shieldauditsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Shield for audit retention for a PCI in-scope environment

    shieldauditsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Shield for audit retention for a HIPAA in-scope workload

    shieldauditsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Shield for audit retention with automatic quarantine on finding

    shieldauditsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Shield for audit retention with continuous compliance reporting

    shieldauditsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Shield for threat detection for a single production account

    shieldthreatsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Shield for threat detection across an AWS Organization

    shieldthreatsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Shield for threat detection inside a shared services account

    shieldthreatsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Shield for threat detection for a regulated data-lake workload

    shieldthreatsecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Shield for threat detection for a cross-account pipeline

    shieldthreatsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Shield for threat detection for a public web API

    shieldthreatsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Shield for threat detection with developer sandbox isolation

    shieldthreatsecuritycompliance
  • Design Secure Architecturescore Members

    Designing Shield for threat detection with break-glass emergency access

    shieldthreatsecuritycompliance
  • Design Secure Architecturescore Members

    Designing Shield for threat detection for a PCI in-scope environment

    shieldthreatsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Shield for threat detection for a HIPAA in-scope workload

    shieldthreatsecuritycompliance
  • Design Secure Architecturescore Members

    Designing Shield for threat detection with automatic quarantine on finding

    shieldthreatsecuritycompliance
  • Design Secure Architecturescore Members

    Designing Shield for threat detection with continuous compliance reporting

    shieldthreatsecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Shield for egress inspection for a single production account

    shieldegresssecuritycompliance
  • Design Secure Architecturescore Members

    Designing Shield for egress inspection across an AWS Organization

    shieldegresssecuritycompliance
  • Design Secure Architecturescore Members

    Designing Shield for egress inspection inside a shared services account

    shieldegresssecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Shield for egress inspection for a regulated data-lake workload

    shieldegresssecuritycompliance
  • Design Secure Architecturesfoundation Members

    Using Shield for egress inspection for a cross-account pipeline

    shieldegresssecuritycompliance
  • Design Secure Architecturescore Members

    Designing Shield for egress inspection for a public web API

    shieldegresssecuritycompliance
  • Design Secure Architecturescore Members

    Designing Shield for egress inspection with developer sandbox isolation

    shieldegresssecuritycompliance
  • Design Secure Architecturesscenario Members

    Architecting Shield for egress inspection with break-glass emergency access

    shieldegresssecuritycompliance
15,202 matches · Page 405 / 507