- AWS Certified Security:Specialty Exam Guide
- Stuart Scott
- 255字
- 2021-06-11 18:13:14
Section 2: Security Responsibility and Access Management
Throughout this section, you will be introduced to one of the most fundamental principals of working with AWS Security: the AWS shared responsibility model. This will help you understand where your security responsibility, both as a customer and as part of AWS, starts and ends. You will then be introduced to a number of different AWS services that allow you to effectively manage and implement solid access control policies so that you can control who has access to which resources within your AWS account. You will also learn about the best practices regarding identity and access management (IAM), in addition to how to create and configure many of the available components.
To implement stringent access control, you will need a solid understanding of how access policies work. To ensure you have this in your tool belt, we'll dive into how to create them and the parameters that are used to define and control access. Finally, we'll look at how to manage access control at scale using federated access to create a single sign-on approach, in addition to how to manage access to AWS resources when using mobile applications.
By the end of this section, you will have a strong understanding of AWS access management and the different techniques and mechanisms that can be used to implement access security.
This section comprises the following chapters:
- Extending Symfony2 Web Application Framework
- DevSecOps敏捷安全
- Kali Linux CTF Blueprints
- 軟件開發安全之道:概念、設計與實施
- 同態密碼學原理及算法
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- Falco云原生安全:Falco原理、實踐與擴展
- 學電腦安全與病毒防范
- 信息安全導論(第2版)
- 實用黑客攻防技術
- Learning Pentesting for Android Devices
- CTF特訓營:技術詳解、解題方法與競賽技巧
- 網絡安全大數據分析與實戰
- 網絡空間安全導論
- Hands-On Artificial Intelligence for Cybersecurity