Broadcast Date: May 18, 2022
Level: 200
Organizations are storing an ever-increasing amount of data on AWS for many different use cases, including data lakes, advanced analytics, machine learning, and enterprise applications. At the same time, they want sensitive non-public data to be only accessible to authorized users from known locations. In this session, we will dive deep into access controls that can help create a data perimeter to ensure access to your data is only allowed from expected networks and trusted identities. Join this webinar to learn where and how to implement data perimeter controls based on different risk scenarios.
Learning Objectives
- Learn how identity, resources, and network can form a data perimeter strategy on AWS
- Deep dive into the broader permission sets with a data perimeter
- Understand how to implement data perimeter at scale for your organization.
Who Should Attend?
Cloud architects, Security architects, Cloud administrators
Speakers
- Tatyana Yatskevich, Sr. SA, Identity Solutions, AWS
Learn More
To learn more about the services featured in this talk, please visit:
https://aws.amazon.com/iam/
Intro body copy here about 2018 re:Invent launches.
Download the Slide Deck
Compute
Service How To
December 19th, 2018 | 1:00 PM PT
Developing Deep Learning Models for Computer Vision with
Amazon EC2 P3 Instances.
Data Lakes & Analytics
Webinar 1:
What's New / Cloud Innovation
December 10th, 2018 | 11:00 AM PT
EMBARGOED
Register Now>