-
- KMS key policy and IAM identity policies determine who decrypts and access various aspects of the state machine, including the definition, execution details, and input/output payload transitions for each tas
- Apply these security guardrails using customer-managed AWS KMS keys at the organizational unit, business unit, or at the individual account level.
-
No comments:
Post a Comment