Amazon Web Services782 тыс
Следующее
Опубликовано 17 февраля 2021, 19:47
Providing users with a scalable and safe way to transfer their data into the cloud is fundamental for many applications. This pattern shows you how to use S3 to manage identity and access with IAM, secure the data with key management & encryption with KMS, maintain detective controls with CloudWatch, CloudTrail, ElasticSearch and on-boarding new users.
Additional Resources:
Restricting S3 Bucket access with specific IAM roles - aws.amazon.com/blogs/security/...
Amazon S3 default encryption for S3 buckets - docs.aws.amazon.com/AmazonS3/l...
WA Security Pillar - wa.aws.amazon.com/wat.pillar.s...
Anomaly detection with ElasticSearch - openlab.cern/sites/openlab.web...
Check out more resources for architecting in the #AWS cloud:
amzn.to/3qXIsWN
#AWS #AmazonWebServices #CloudComputing #BackToBasics #CloudStorage #S3
Additional Resources:
Restricting S3 Bucket access with specific IAM roles - aws.amazon.com/blogs/security/...
Amazon S3 default encryption for S3 buckets - docs.aws.amazon.com/AmazonS3/l...
WA Security Pillar - wa.aws.amazon.com/wat.pillar.s...
Anomaly detection with ElasticSearch - openlab.cern/sites/openlab.web...
Check out more resources for architecting in the #AWS cloud:
amzn.to/3qXIsWN
#AWS #AmazonWebServices #CloudComputing #BackToBasics #CloudStorage #S3