Broadcast Date: May 18, 2022

Level: 200

Organizations are storing an ever-increasing amount of data on AWS for many different use cases, including data lakes, advanced analytics, machine learning, and enterprise applications. At the same time, they want sensitive non-public data to be only accessible to authorized users from known locations. In this session, we will dive deep into access controls that can help create a data perimeter to ensure access to your data is only allowed from expected networks and trusted identities. Join this webinar to learn where and how to implement data perimeter controls based on different risk scenarios.

Learning Objectives

  • Learn how identity, resources, and network can form a data perimeter strategy on AWS
  • Deep dive into the broader permission sets with a data perimeter
  • Understand how to implement data perimeter at scale for your organization.

Who Should Attend?

Cloud architects, Security architects, Cloud administrators

Speakers

  • Tatyana Yatskevich, Sr. SA, Identity Solutions, AWS


Learn More

To learn more about the services featured in this talk, please visit:
https://aws.amazon.com/iam/

Intro body copy here about 2018 re:Invent launches.

Download the Slide Deck

Compute

Service How To

December 19th, 2018 | 1:00 PM PT

Developing Deep Learning Models for Computer Vision with
Amazon EC2 P3 Instances.

Register Now>

Containers

What's New / Cloud Innovation

December 11th, 2018 | 1:00 PM PT

EMBARGOED

Register Now>

Data Lakes & Analytics

Webinar 1:

What's New / Cloud Innovation

December 10th, 2018 | 11:00 AM PT

EMBARGOED

Register Now>

Webinar 2:

What's New / Cloud Innovation

December 12th, 2018 | 11:00 AM PT

EMBARGOED

Register Now>