- AWS Certified Security:Specialty Exam Guide
- Stuart Scott
- 67字
- 2021-06-11 18:13:16
Technical requirements
To perform the tasks mentioned within this chapter, you will need to have the correct permissions to allow you to perform a number of different actions within the IAM service, including the creation and management of users, groups, and roles, in addition to configuring MFA. The permissions given in the IAMFullAccess policy will be sufficient to carry out all the actions in this chapter.
推薦閱讀
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- 反黑命令與攻防從新手到高手(微課超值版)
- Learning Veeam? Backup & Replication for VMware vSphere
- 硬黑客:智能硬件生死之戰(zhàn)
- 安全防御入門手冊(cè)
- 人工智能安全(精裝版)
- 先進(jìn)云安全研究與實(shí)踐
- 博弈論與數(shù)據(jù)安全
- 信息系統(tǒng)安全等級(jí)化保護(hù)原理與實(shí)踐
- 數(shù)字銀行安全體系構(gòu)建
- 社會(huì)工程:防范釣魚欺詐(卷3)
- 極限黑客攻防:CTF賽題揭秘