Identity Management
Ensure that authorized people – and only authorized people – have access to the technology resources they need to perform their job functions.
-
Best Practices
Identity Hijacking: Understanding and Prevention
It is crucial to be aware of the risks associated with identity hijacking and take proactive steps to protect yourself…
Read More » -
Best Practices
Zero-privilege operations: Running services without access to data
In this session, learn how AWS secures data, even from trusted AWS operators and services.
Read More » -
Best Practices
Harness power of IAM policies & rein in permissions w/Access Analyzer
Explore the power of IAM policies and discover how to use IAM Access Analyzer to set, verify, and refine permissions.
Read More »