IAM

Mergers and divestitures patterns for organizations on AWS

Patterns and best practices for managing AWS Organizations through mergers, acquisitions, and divestitures at enterprise scale.

avatar
Swara Gandhi

Unlock new possibilities: AWS Organizations service control policy now supports full IAM language

AWS Organizations SCPs now support the full IAM policy language — new capabilities, patterns, and what this means for enterprise governance.

avatar
Swara Gandhi

Bridging the identity gap: Orchestrating IAM across teams and systems

How organizations can bridge identity gaps and orchestrate IAM policies across disparate teams and systems using automation.

avatar
Swara Gandhi

Scaling IAM: Advanced administration and delegation patterns

Advanced IAM administration patterns for delegating access management at scale across large, complex AWS environments.

avatar
Swara Gandhi

Streamlining AWS Organizations cleanup strategies

Strategies and automation patterns for cleaning up and rationalizing AWS Organizations structures, SCPs, and account hierarchies at scale.

avatar
Swara Gandhi

Deploy AWS Organizations resources by using CloudFormation

How to manage and deploy AWS Organizations resources including SCPs and RCPs using CloudFormation as infrastructure-as-code.

avatar
Swara Gandhi

How to prioritize IAM Access Analyzer findings

Strategies and workflows for triaging and prioritizing IAM Access Analyzer findings to focus remediation efforts on the highest-risk issues.

avatar
Swara Gandhi

Get more out of service control policies in a multi account environment

Best practices for maximizing the effectiveness of service control policies across a multi-account AWS Organizations environment.

avatar
Swara Gandhi

Validate IAM policies with Access Analyzer using AWS Config rules

How to use AWS Config custom rules alongside IAM Access Analyzer to continuously validate IAM policies for compliance and security posture.

avatar
Swara Gandhi

Create enterprise-wide preventive guardrails, featuring Inter & Co.

Building enterprise-scale preventive security controls with AWS Organizations SCPs, featuring a real-world case study with Inter & Co.

avatar
Swara Gandhi

Building a data perimeter to allow access to authorized users

How to build a data perimeter on AWS to ensure only authorized identities, from expected networks, can access company data.

avatar
Swara Gandhi

Getting more out of your service control policies, featuring Morgan Stanley

Advanced SCP patterns and governance strategies at enterprise scale, featuring Morgan Stanley's approach to multi-account identity governance.

avatar
Swara Gandhi

Establishing data perimeters on AWS

Workshop on establishing and enforcing data perimeters on AWS to control which identities, resources, and networks can access company data.

avatar
Swara Gandhi