Documento técnico
Diez pasos para eliminar el riesgo de acceso en AWS
Achieve least privilege and remove unused access to protect your AWS data
In 10 steps, you can determine the access open to a single user or application. In this white paper we will show you how to look beyond IAM policies to achieve least-privilege. You’ll also learn how to evaluate the permissions granted to users or applications and how to use this information to achieve least-privilege.
¡Rellene el formulario para obtener su copia del documento técnico!
- Cloud
- Tenable Cloud Security