Premium Content

Access "Who's who? Identity management a key to AWS security"

identity_management_AWS.png

Sponsored by SearchAWS

Understanding security is essential for trusting any cloud service, and AWS is no exception. How is data secured in AWS? What are its rules, methods and models? What are the best practices? And which elements are the responsibility of the customer and which are handled by Amazon Web Services? This handbook examines those questions, and proposes strategies for making the most of roles, groups and specific AWS identity management tools.  Access >>>

Table of contents

  • With AWS, traditional security fits and doesn't fit
  • Protect assets with AWS identity management
  • Security questions frustrate AWS users

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • When AWS automation takes the wheel
    AWS_wheel.png
    E-Handbook

    One of the greatest advantages of Amazon Web Services is the ability to automate services and functions of cloud applications. Still, before ...

  • Dollars and sense: The economics of AWS
    AWS_economics.png
    E-Handbook

    Competitive pricing is driving much of the growth in the adoption of Amazon Web Services. But how cheap is AWS, really? Users need to understand ...

  • The AWS role in disaster recovery
    AWS_role.png
    E-Handbook

    No matter how well prepared you might be, disaster can strike. Most mature IT organizations have disaster recovery plans, but Amazon Web Services ...