Configuration and vulnerability analysis in AWS Identity and Access Management - AWS Identity and Access Management

Configuration and vulnerability analysis in AWS Identity and Access Management

AWS handles basic security tasks like guest operating system (OS) and database patching, firewall configuration, and disaster recovery. These procedures have been reviewed and certified by the appropriate third parties. For more details, see the following resources:

The following resources also address configuration and vulnerability analysis in AWS Identity and Access Management (IAM):