Premium Content

Access "Who's who? Identity management a key to AWS security"


Sponsored by SearchAWS

Understanding security is essential for trusting any cloud service, and AWS is no exception. How is data secured in AWS? What are its rules, methods and models? What are the best practices? And which elements are the responsibility of the customer and which are handled by Amazon Web Services? This handbook examines those questions, and proposes strategies for making the most of roles, groups and specific AWS identity management tools.  Access >>>

Table of contents

  • With AWS, traditional security fits and doesn't fit
  • Protect assets with AWS identity management
  • Security questions frustrate AWS users

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Dollars and sense: The economics of AWS

    Competitive pricing is driving much of the growth in the adoption of Amazon Web Services. But how cheap is AWS, really? Users need to understand ...

  • The AWS role in disaster recovery

    No matter how well prepared you might be, disaster can strike. Most mature IT organizations have disaster recovery plans, but Amazon Web Services ...

  • The ins, outs and in-betweens of AWS big data analytics

    Big data and Amazon Web Services may go well together, but what are the steps to getting started? How much of an investment -- time, people, power ...