Summary

This chapter has focused on some of the key authentication, authorization, and access control mechanisms that are used when controlling access to your resources. Understanding the access control process and how to implement specific controls is a must for all security architects and engineers. AWS provides solid security mechanisms, with the ability to enforce stringent access security controls, but it's down to us, the users of AWS, to implement and architect those policies.  

Before implementing an access control strategy, you must have an awareness of all of the available options, to determine the best course of action for your organization and environment.

 

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.121.101