Sponsored by SearchAWS
Understanding security is essential for trusting any cloud service, and AWS is no exception. How is data secured in AWS? What are its rules, methods and models? What are the best practices? And which elements are the responsibility of the customer and which are handled by Amazon Web Services? This handbook examines those questions, and proposes strategies for making the most of roles, groups and specific AWS identity management tools. Access >>>
Table of contents
- With AWS, traditional security fits and doesn't fit
- Protect assets with AWS identity management
- Security questions frustrate AWS users
Premium Content for Free.
More Premium Content Accessible For Free
The ins, outs and in-betweens of AWS big data analytics
Big data and Amazon Web Services may go well together, but what are the steps to getting started? How much of an investment -- time, people, power ...
Getting started with AWS EC2 instances
An organization can find many good reasons to take advantage of AWS offerings, but just how do you get started? This handbook provides detailed ...
For AWS cloud computing, it's not all sunshine and rainbows
At first glance, Amazon Web Services may seem as user-friendly as a point-and-click consumer app. But as many customers can attest -- and as the ...