-
- KMS key policy and IAM identity policies determine who decrypts and access various aspects of the state machine, including the definition, execution details, and input/output payload transitions for each tas
- Apply these security guardrails using customer-managed AWS KMS keys at the organizational unit, business unit, or at the individual account level.
-
Shak.blog.notes 07/30/2024
Shak.blog.notes 07/27/2024
-
Amazon API Gateway governance in depth | Serverless Land
tags: blog
-
AWS Identity and Access Management policies, permission boundaries (IAM)
You control access in AWS by creating policies and attaching them to AWS identities or resources. A policy is an object in AWS that, when associated with an identity or resource, defines their permissions. AWS evaluates these policies when a principal (user or role session) makes a request. Permissions in the policies determine whether the request is allowed or denied. Most policies are stored in AWS as JSON documents. In IAM, a permissions boundary is used to set the maximum permissions that an identity-based policy can grant to an IAM entity (users or roles). An entity's permission boundary allows it to perform only the actions that are allowed by both its identity-based policies and its permission boundaries.
-
-
Amazon API Gateway governance in depth | Serverless Land
tags: blog
- Amazon API Gateway governance in depth
-