Skip to content
Identity and Access Management – Securing Users, Roles, and Policies – Microsoft AWS
Close Button
  • Contact Us

Category: Managing cryptographic keys

Inline policies – Identity and Access Management – Securing Users, Roles, and Policies

9 August, 2024 Kennedy Kincaid 0 Comments 6 categories

Inline policies Apart from managed policies, AWS also offers inline policies. An inline policy is a policy that is directly embedded in a single user, group, or role. They are not standalone like managed policies…

Read More

Snapshots – Data Protection – Encryption, Key Management, and Data Storage Best Practices

9 April, 2024 Kennedy Kincaid 0 Comments 3 categories

Snapshots EBS snapshots provide point-in-time backups of your volumes and are stored in S3, inheriting its durability features. They play a crucial role in data recovery, allowing you to restore your volume to a previous…

Read More

DynamoDB tables – Data Protection – Encryption, Key Management, and Data Storage Best Practices

25 January, 2024 Kennedy Kincaid 0 Comments 4 categories

DynamoDB tables Amazon DynamoDB provides a robust foundation, yet data resiliency and security are your responsibility. Let’s delve into the backup and encryption features that are essential for safeguarding your valuable DynamoDB assets. Backup Data…

Read More

Advanced IAM policy conditions – Identity and Access Management – Securing Users, Roles, and Policies

9 November, 2023 Kennedy Kincaid 0 Comments 4 categories

Advanced IAM policy conditions Conditions provide the granular control that many organizations need. They allow you to specify the circumstances under which the policy statement is in effect. These conditions can be: Global conditions: Apply…

Read More

Advanced IAM policy use cases – Identity and Access Management – Securing Users, Roles, and Policies

14 July, 2023 Kennedy Kincaid 0 Comments 5 categories

Advanced IAM policy use cases While AWS provides a plethora of built-in policies and templates, understanding how to tailor policies for specific scenarios can make all the difference. In this subsection, we will explore four…

Read More

Forcing encryption with a specified KMS key – Identity and Access Management – Securing Users, Roles, and Policies

6 May, 2023 Kennedy Kincaid 0 Comments 5 categories

Forcing encryption with a specified KMS key Imagine that you are managing a multi-tenant AWS environment. Each IAM user represents a tenant and has a tenant tag indicating their tenant ID. Each KMS key is…

Read More

Centralized IAM management – Identity and Access Management – Securing Users, Roles, and Policies

9 March, 2023 Kennedy Kincaid 0 Comments 6 categories

Centralized IAM management For expansive organizations with numerous AWS accounts, centralizing IAM management is not just beneficial – it is essential. It fosters consistency, trims administrative tasks, and bolsters security. With AWS Organizations providing the…

Read More

Data in transit – Data Protection – Encryption, Key Management, and Data Storage Best Practices

9 July, 2022 Kennedy Kincaid 0 Comments 3 categories

Data in transit Data in transit, or data in transport, refers to data actively moving between devices, be it between user locations and AWS or between AWS services. Given the potential vulnerabilities associated with data…

Read More

Comparison – Data Protection – Encryption, Key Management, and Data Storage Best Practices

9 February, 2022 Kennedy Kincaid 0 Comments 4 categories

Comparison To provide a clearer perspective on the choices available, the following table (Table 4.1) compares SSE and CSE side-by-side with BYOK and AWS-managed keys options, highlighting the benefits and limitations of each possibility:  BYOKsAWS-Managed…

Read More

Example – Data Protection – Encryption, Key Management, and Data Storage Best Practices

9 October, 2021 Kennedy Kincaid 0 Comments 4 categories

Example Imagine a healthcare application that stores patient records. Given the sensitive nature of health data, it is imperative to ensure that this data is encrypted both when stored and when transmitted between the application…

Read More

Posts pagination

Page 1 Page 2 Next page

Archives

  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • July 2023
  • May 2023
  • March 2023
  • January 2023
  • November 2022
  • September 2022
  • July 2022
  • May 2022
  • March 2022
  • February 2022
  • December 2021
  • October 2021
  • September 2021
  • July 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021

Categories

  • Advanced IAM policy use cases
  • Best practices for KMS
  • Certifications of Microsoft
  • Data protection in key AWS services
  • Managing cryptographic keys
  • Microsoft AWS Exams

Copyright © 2024 realwe.org