filmov
tv
AWS re:Inforce 2023 - Setting up AWS Verified Access (NIS223)
Показать описание
In this lightning talk, walk through how to set up AWS Verified Access, a new, simplified way to secure user access to corporate applications. Built on AWS Zero Trust guiding principles, AWS Verified Access validates every application request before granting access, without the need for a VPN. Learn how to natively integrate with device and identity providers and use the new Cedar language for granular and secure access policies.
Subscribe:
ABOUT AWS
Amazon Web Services (AWS) hosts events, both online and in-person, bringing the cloud computing community together to connect, collaborate, and learn from AWS experts.
AWS is the world's most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster.
#reInforce2023 #AWSEvents
Subscribe:
ABOUT AWS
Amazon Web Services (AWS) hosts events, both online and in-person, bringing the cloud computing community together to connect, collaborate, and learn from AWS experts.
AWS is the world's most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster.
#reInforce2023 #AWSEvents
AWS re:Inforce 2023 - Setting up AWS Verified Access (NIS223)
AWS re:Inforce 2023 - More easily validate the components of the software you build (APS203)
AWS re:Inforce 2023 - Steps toward a Zero Trust architecture on AWS (IAM307)
AWS re:Inforce 2023 - A first-principles approach: AWS Identity and Access Management (IAM) (IAM201)
AWS re:Inforce 2023 - Security practices for customizing multiple environments (GRC303)
AWS re:Inforce 2023 - From IDE to production: Actionable ML-powered code security analysis (APS302)
AWS re:Inforce 2023 - Improving code security analysis with AI/ML (APS222)
AWS re:Inforce 2023 - Best practices for cloud governance at scale (GRC305)
AWS re:Inforce 2023 - Firewalls, and where to put them (NIS306)
AWS re:Inforce 2023 - Using AWS data protection services for innovation and automation (DAP305)
AWS re:Inforce 2023 - Journeys to Zero Trust on AWS (SEC202-L)
AWS re:Inforce 2023 - Centralize and manage secrets with HashiCorp Cloud (PRT206-S)
AWS re:Inforce 2023 - Establishing a data perimeter on AWS, featuring USAA (IAM301)
AWS re:Inforce 2023 - Optimizing audits with automation (GRC201)
AWS re:Inforce 2023 - Helping security and developers to understand one another (PRT213-S)
AWS re:Inforce 2023 - Wix’s layered security strategy to discover & protect sensitive data (TDR2...
AWS re:Inforce 2023 - Policy and Suricata compatible rule creation for AWS Network Firewall (NIS308)
AWS re:Inforce 2023 - Building a new cloud security operating model (sponsored by Wiz) (NIS203-S)
AWS re:Inforce 2023 - From code to insight: Amazon Inspector & AWS Lambda in action (APS221)
AWS re:Inforce 2023 - Behind the scenes: AWS investments in security innovation (NIS201)
AWS re:Inforce 2023 - A deep dive into container security on AWS (APS204-S)
AWS re:Inforce 2023 - Security monitoring for connected devices across OT, IoT, edge, cloud (TDR222)
AWS re:Inforce 2023 - Engineer application resilience with compliance in mind (GRC304)
AWS re:Inforce 2023 - Amazon S3 encryption and access control best practices (DAP306)
Комментарии