白皮書
消除 AWS 中访问风险的 10 个步骤
Achieve least privilege and remove unused access to protect your AWS data
In 10 steps, you can determine the access open to a single user or application. In this white paper we will show you how to look beyond IAM policies to achieve least-privilege. You’ll also learn how to evaluate the permissions granted to users or applications and how to use this information to achieve least-privilege.
填妥表單,就能取得此白皮書複本!
- Tenable Cloud Security