I’m looking forward to this session, as it’ll benefit anyone who wants to learn how to scale assignment of permission sets to users and groups.
IAM helps you control access to AWS resources. When you have multiple groups and users in your organization, it becomes difficult to manage access to resources. You can either manage them by using an AWS Organizations organizational unit, role-based access control, or implementation of access control policies— all examples of ways to manage scaling with IAM.
Allegiant Airlines will share how they were able to successfully manage scaling access by automating federated role-based access to more than 5,000 AWS accounts, all while using infrastructure as code and a CI/CD pipeline.
This session will benefit anyone that wants to learn how to balance between securing multiple AWS accounts and facilitating agile development.
Agile development methodologies are getting increasingly popular nowadays, as they help with shorter time to market, adaptability to change, and being able to collaborate effectively. The downside is that team members need to be given a high degree of control.
On the other hand, giving too much access increases security risks. And this is where the principle of least privilege sets in. Here we need to give team members minimum access to avoid data breaches, cybersecurity events, and other potential risks.
Fidelity and Pfizer will share how they were able to successfully empower their business stakeholders to quickly develop solutions at scale while still conforming to security standards and operating.
This session will benefit anyone that wants to learn how to define and manage identities for your workloads and how to monitor and audit activities performed by those identities.
Many organizations are adopting a hybrid cloud structure, and this can be challenging when trying to manage access to resources across multiple platforms. IAM Roles Anywhere allows administrators to assign roles to on-premises resources or other cloud platforms.
In this session, Hertz will share how they used IAM Roles Anywhere to secure a non-AWS application’s access to AWS services, while improving security with this practice.
This session will benefit anyone that wants to learn how Zillow uses AWS Firewall Manager to centrally manage AWS WAF rules and AWS Shield Advanced protection across multiple accounts.
With all of the recent application and data breaches, the security of data and applications is becoming increasingly important every single day. IAM, encryption, monitoring, and logging are some of the methods companies use to protect their data.
Zillow will share how they used AWS Firewall Manager to centrally manage AWS WAF rules and AWS Shield Advanced protection across multiple accounts and also how the solution helped them respond promptly to the well-publicized Log4j vulnerability.
This session will benefit anyone that wants to learn how to protect their most sensitive data using a comprehensive set of AWS data protection services to securely manage their own keys, certificates, and application secrets.
Learn how AWS KMS, AWS Private Certificate Authority, and AWS Secrets Manager can help ensure security and other organizational compliance.