- AWS Certified Security:Specialty Exam Guide
- Stuart Scott
- 94字
- 2021-06-11 18:13:17
Summary
This chapter covered some of the key, essential components when managing access to your resources, including users, groups, roles, and MFA. With an understanding of these components within IAM, you are now able to successfully and securely control access and boost your security. The policies that underpin the permissions that are assigned to the identity objects help tie together the authentication and authorization functions of your access control mechanisms.
In the next chapter, we will be focusing on these policies, and how to implement and change them to suit your security needs.
推薦閱讀
- Extending Symfony2 Web Application Framework
- unidbg逆向工程:原理與實踐
- 網(wǎng)絡空間安全:管理者讀物
- 計算機病毒分析與防范大全(第3版)
- 黑客攻防入門秘笈
- .NET安全攻防指南(上冊)
- Learning Veeam? Backup & Replication for VMware vSphere
- 同態(tài)密碼學原理及算法
- 解密彩虹團隊非凡實戰(zhàn)能力:企業(yè)安全體系建設(共5冊)
- 信息安全工程與實踐
- 網(wǎng)絡服務安全與監(jiān)控
- Mastering Python for Networking and Security
- 計算機系統(tǒng)與網(wǎng)絡安全研究
- 網(wǎng)絡入侵檢測系統(tǒng)原理與應用
- 紅藍攻防:技術與策略(原書第3版)