Video description
Learn to pass the Solutions Architect exam with security material
00:00 Intro
03:15 Components of Security
06:14 Identity bases vs. Resource bases
09:59 Cloud Trail
14:58 Role based privilages
19:26 SAML
23:31 Security Use Cases
Alright, so I’m live here 52 weeks of AWS, continuing to cover the solutions architect certification material. And today I’m going to talk about securing user and application access. Probably one of the most timely topics that we can discuss for cloud computing, there is a lot of increased risk of cybersecurity threats in in the world right now. And there’s conflicts that could potentially make your organization really need to care a bit more about cybersecurity. And so this is a great topic for today. So let’s go ahead and dive right in here. I’m going to talk through this material on securing user and application access. I’m going to go ahead and share my screen if you’re watching. Live here with the video, and let’s get to it. Okay, so first up securing user application access. We’re talking about some of the things like architectural needs the user account and I ns, how to organize users do federated users multiple accounts. also play around a little bit with AWS itself and do some demos, if it seems like it’s needed. So by the end of this talk, today, I’m going to cover I am groups roles, how to use user Federation, also about AWS organizations, and how to manage multiple AWS accounts, which is, in fact, a really good process for many organizations. Okay, let’s get into architectural need first.
Table of Contents
Lesson 1
“52 Weeks Aws Secure User”