
Red Hat Audit Configuration Demonstration
Audit Rule Definition And Audit Report Creation
Introduction to Linux System Auditing
AWS IAM Policies Part 1
Policy creation is at the very center of Identity and Access Management in AWS. We will use these policies to enable permissions for users, groups, and roles. We are going to cover AWS managed policies and custom policies in this post.
continue reading

