2
Securing Access with AWS Identity and Access Management
Protecting AWS-hosted applications from unauthorized access is of paramount importance for any business. As an organization, you must ensure that only authorized entities can authenticate against your workloads. Furthermore, those entities must only be permitted to create and manage resources and perform tasks for which they are authorized. This concept is the principle of least privilege (POLP) and is fundamental to developing a secure environment. This chapter will teach you why authentication and authorization services are crucial. You will understand the importance of providing various access options to authenticate internal users and, where required, offer anonymous public access ...
Get AWS Certified Developer Associate Certification and Beyond now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.