Amazon Web Services

In this informative video, Victor Feynman, a Solutions Architect at Amazon Web Services, demonstrates how to use IAM Access Analyzer policy generation to create fine-grained IAM policies that adhere to the principle of least privilege. He walks through the four-step process of requesting, reviewing, refining, and creating policies based on CloudTrail logs. This feature analyzes access activity to intelligently generate least privileged policies, which is particularly useful during rapid application development. Feynman highlights that this valuable tool is available at no additional cost, making it easier for AWS users to implement best practices in access management and security.

product-information
skills-and-how-to
security-marketing-priority
security-identity-compliance
cloudtrail
Show 5 more

Up Next

VideoThumbnail
47:39

Simplifying Application Authorization: Amazon Verified Permissions at AWS re:Invent 2023

Nov 22, 2024
VideoThumbnail
2:53:33

Streamlining Patch Management: AWS Systems Manager's Comprehensive Solution for Multi-Account and Multi-Region Patching Operations

Nov 22, 2024
VideoThumbnail
9:30

Deploying ASP.NET Core 6 Applications on AWS Elastic Beanstalk Linux: A Step-by-Step Guide for .NET Developers

Nov 22, 2024
VideoThumbnail
2:51

How to Start, Connect, and Enroll Amazon EC2 Mac Instances into Jamf for Apple Mobile Device Management

Nov 22, 2024
VideoThumbnail
1:01:07

Accelerate ML Model Delivery: Implementing End-to-End MLOps Solutions with Amazon SageMaker

Nov 22, 2024