Premium Content

Access "Who's who? Identity management a key to AWS security"


Sponsored by SearchAWS

Understanding security is essential for trusting any cloud service, and AWS is no exception. How is data secured in AWS? What are its rules, methods and models? What are the best practices? And which elements are the responsibility of the customer and which are handled by Amazon Web Services? This handbook examines those questions, and proposes strategies for making the most of roles, groups and specific AWS identity management tools.  Access >>>

Table of contents

  • With AWS, traditional security fits and doesn't fit
  • Protect assets with AWS identity management
  • Security questions frustrate AWS users

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • The AWS role in disaster recovery

    No matter how well prepared you might be, disaster can strike. Most mature IT organizations have disaster recovery plans, but Amazon Web Services ...

  • The ins, outs and in-betweens of AWS big data analytics

    Big data and Amazon Web Services may go well together, but what are the steps to getting started? How much of an investment -- time, people, power ...

  • Getting started with AWS EC2 instances

    An organization can find many good reasons to take advantage of AWS offerings, but just how do you get started? This handbook provides detailed ...