top of page
![](https://static.wixstatic.com/media/11062b_4b7c9a8e48334d5aad2fd274fddba3bc~mv2.jpg/v1/fill/w_1920,h_1280,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/11062b_4b7c9a8e48334d5aad2fd274fddba3bc~mv2.jpg)
Search
![Building effective IAM policies #AWSreInvent #SEC305](https://static.wixstatic.com/media/3b6a87_8dc1f0739ee7452989376775d1a41e05~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/3b6a87_8dc1f0739ee7452989376775d1a41e05~mv2.webp)
Emily
Apr 7, 20243 min read
Building effective IAM policies #AWSreInvent #SEC305
Our team actively participated in the Builders' Session focused on crafting an IAM (Identity and Access Management) policy. This report...
15 views0 comments
bottom of page